Post job

Cyber security analyst jobs in Tracy, CA

- 203 jobs
All
Cyber Security Analyst
Cyber Security Engineer
Security Engineer
Information Security Engineer
Senior Security Engineer
Information Security Analyst
Security System Engineer
Securities Analyst
Senior Cyber Security Analyst
Information Assurance Analyst
Information Systems Security Officer
  • Senior Security GRC Engineer

    Hill Physicians Medical Group

    Cyber security analyst job in San Ramon, CA

    At PriMed, your uniqueness is valued, celebrated, encouraged, supported, and embraced. Whatever your relationship with Hill Physicians, we welcome ALL that you are. We value and respect your race, ethnicity, gender identity, sexual orientation, age, religion, disabilities, experiences, perspectives, and other attributes. Our celebration of diversity and foundation of inclusion allows us to leverage our differences and capitalize on our similarities to better serve our communities. We do it because it's right! Job Description We are seeking a skilled Governance, Risk, and Compliance (GRC) Engineer to strengthen our security posture and ensure adherence to healthcare regulations. The GRC Engineer will play a vital role in designing, implementing, and maintaining risk management processes, compliance frameworks, and policies that align with healthcare regulations such as HIPAA and HITECH. The ideal candidate will have experience with tools like SAI360, CyberArk, and other compliance and security platforms. Job Responsibilities: Develop, implement, and maintain GRC policies, processes, and controls in alignment with industry best practices and regulatory requirements (e.g., HIPAA, HITECH, NIST, ISO 27001). Perform risk assessments and develop mitigation strategies for identified security risks. Administer and optimize SAI360 for governance, risk management, and compliance activities, including reporting and policy management. Collaborate with cross-functional teams to ensure new projects and systems are designed with security and compliance in mind. Monitor and report on compliance status, identifying gaps and proposing remediation strategies. Oversee third-party vendor risk assessments and ensure adherence to security requirements. Support internal and external audits by providing documentation, evidence, and responses to audit findings. Conduct security awareness training programs and promote a culture of compliance within the organization. Required Experience/Skills/Knowledge: 5+ years of experience in Governance, Risk, and Compliance roles or a related field. Strong knowledge of healthcare regulations, including HIPAA, HITECH, and other relevant standards. Proficiency in GRC tools such as SAI360 for compliance and risk management. Experience with privileged access management tools like CyberArk. Solid understanding of risk assessment methodologies and security frameworks, including NIST CSF, ISO 27001, or COBIT. Excellent communication and collaboration skills to engage with technical and non-technical stakeholders. Strong analytical and organizational skills with attention to detail. This role is critical in maintaining our organization's compliance with healthcare security standards and reducing risk exposure. Required Education: Bachelor's degree in computer science, Information Technology, Cybersecurity, or a related field. Equivalent work experience may be considered in lieu of a degree.
    $131k-184k yearly est. 4d ago
  • Access Assurance Analyst - USDS

    Tiktok 4.4company rating

    Cyber security analyst job in San Jose, CA

    Team Intro The Access Assurance vertical within USDS Data Identity and Access Management (DIAM) Team is responsible for designing and maintaining an access management program with a mission to enforce the principle of least privilege. We strive to establish secure and compliant processes around provisioning, deprovisioning and governance of access to USDS data and infrastructure proactively identifying and reducing risks. Job Overview: As an Access Assurance Analyst, you will be part of the team responsible for Access Assurance within TikTok USDS. You will be responsible for supporting the team along with a team of cross-functional cyber, privacy, engineering, and data protection analysts to define, implement, manage, and measure controls to protect data in accordance with USDS policies and standards relevant to geographical regulations, contractual commitments, and confidentiality requirements. The Access Assurance Analyst will play a pivotal role in operationalization of access management programs in USDS. In order to enhance collaboration and cross-functional partnerships, among other things, at this time, our organization follows a hybrid work schedule that requires employees to work in the office 3 days a week, or as directed by their manager/department. We regularly review our hybrid work model, and the specific requirements may change at any time. Responsibilities: * Design access management program that addresses data residency and fine-grained role-based access requirements and controls as necessitated by business need and regulations * Assist in the development and implementation of Access governance frameworks, policies, and procedures. * Build and review technical and functional requirements for in-house or external technologies to support access management and assurance needs, including applying appropriate security measures * Operationalize access management workflows to improve efficiency * Support periodic reviews of access to USDS data and systems * Drive remediation of non-compliant access in a timely fashion * Implement and enforce mechanisms to proactively monitor, respond and report on inappropriate data access events * Work with other information security teams to classify and categorize data based on sensitivity and compliance requirements * Support interactions with Risk and Compliance to understand control requirements and provide information to support findings for non-compliance with internal security policies * Responsible for designing and reporting key metrics and visualizations for weekly, monthly and bimonthly cadences across multiple audiences * Participate in security reviews to ensure compliance with access governance policies. * Foster a principle of least privilege for access management * Collaborate with key stakeholders to ensure alignment of access governance initiatives with organizational goals.Minimum Qualifications: * Bachelor's degree in a related field (e.g., Information Management, Computer Science, Business Analytics, Cyber Security) * 5+ years of experience in identity and access management or access governance & 5+ years of experience working with IAM tools and strong knowledge of Access management concepts (RBAC, PAM, Access Reviews, SOD, LCM, provisioning and deprovisioning of Access) * Experience in designing/deploying Access management solutions, Experience analyzing large data sets across multiple database types (e.g., MySQL, Hive, Redis etc) leveraging SQL etc., Experience with industry frameworks, standards and regulations (e.g. ISO, NIST) * Ability to write scripts, develop automations, configure tools, work with APIs and databases while being Proficient in at least one software programming language (Python,Java,Ruby etc) along with Familiarity with Cloud-based technology deployments * Demonstrate ability to quickly assimilate to new knowledge and remain current on new developments in cybersecurity capabilities and industry knowledge * Strong analytical and problem-solving skills with the Ability to communicate technical concepts to a broad range of technical and non-technical staff * Comfortable working in a fast-paced, dynamic environment Preferred Qualifications: * Strong understanding of technology environments and various databases * Experience working with technology partners to validate data-related problems * Experience working with Microservices architecture * Experience in automating access management workflows to reduce operational overhead * Experience with risk and controls frameworks including (ISO 27001, NIST CSF, NIST RMF, FAIR, COBIT, NIST RMF, ISO 31000 etc.)
    $76k-131k yearly est. 24d ago
  • Cyber Security

    Forhyre

    Cyber security analyst job in Sunnyvale, CA

    Job Description Forhyre is seeking a talented individual that will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients. Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time. Responsibilities: Engineer, implement and monitor security measures for the protection of computer systems, networks and information Develop and implement security policies and controls to support the Cyber Security framework Manage the existing cyber security training program across global, multilingual business Assists in ensuring global Information security program meets all industry regulations, standards, and compliance requirements Drive adoption of infrastructure security best practices and work with Information Technology teams to ensure security standards are maintained Implement technology to proactively scan Information Technology environment for security breaches and suspicious activity Continuous improvement in the areas of Information Security technologies, techniques and processes Develops and maintains an effective system for the distribution of regular key performance indicator reports and dashboard Ability to interpret penetration test results and describe issues and fixes to non-security expert Responsible for leading an accurate & comprehensive status reporting to the executive steering committee Create and implement SOP/ process improvement initiatives to achieve outcomes that align or exceed the expectations of strategic roadmap Skills & Experience Bachelor's degree and 12+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree. Certified Information Systems Security Professional (CISSP) 8+ years hands-on experience designing or implementing security solutions, including all related documentation and artifacts Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps Extensive experience in design and development of enterprise security architectures. Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology. Strong knowledge and experience in secure enterprise architecture design, especially with regard to IAM, NDR, EDR, SIEM, AI/ML, and other cybersecurity tools and resultant applications Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes Previous experience developing architectures, strategies, strategic plans, roadmaps, and technical standards for the federal IT enterprise environment. Vulnerability Assessment testing and/or Penetration Testing (preferred) Robotic Process Automation/Intelligent Automation (preferred) Business case development supporting security technology solutions (preferred) Additional certifications demonstrating cybersecurity/technical mastery (preferred)
    $88k-125k yearly est. 10d ago
  • Cyber Security Analyst

    Hello Heart 3.9company rating

    Cyber security analyst job in Menlo Park, CA

    Hello Heart is on a mission to change the way people care for their hearts. The company provides the first app and connected heart monitor to help people track and manage their heart health. With Hello Heart, users take steps to control their risk of heart attacks and stroke - the leading cause of death in the United States. Peer-reviewed studies have shown that high-risk users of Hello Heart have seen meaningful drops in blood pressure, cholesterol and even weight. Recognized as the digital leader in preventive heart health, Hello Heart is trusted by more than 130 leading Fortune 500 and government employers, national health plans, and labor organizations. Founded in 2013, Hello Heart has raised more than $138 million from top venture firms and is a best-in-class solution on the American Heart Association's Innovators' Network and CVS Health Point Solutions Management platform. Visit ****************** for more information. About the Role We are seeking a Cyber Security Analyst to strengthen our security operations and compliance posture. Reporting into our Information Security Officer, you will play a key role in protecting sensitive data, ensuring regulatory compliance, and supporting the secure adoption of new technologies such as AI. You will work cross-functionally with IT, Engineering, Compliance, and HR to build and maintain secure, resilient processes across the organization. Responsibilities Support secure access lifecycle processes, including provisioning, deprovisioning, role-based access, and MFA/SSO management Conduct periodic access reviews and ensure identity data quality Perform vulnerability scans across systems and applications, track remediation progress, and partner with teams to prioritize risk-based fixes Assist with security assessments of cloud systems and applications, aligning with HIPAA, HITECH, NIST, and HITRUST frameworks Support internal and external audit preparation and execution Enforce encryption, access controls, and data loss prevention strategies for sensitive data Conduct third-party vendor risk assessments and oversee remediation efforts Support secure adoption of AI tools by monitoring for risks such as data leakage and prompt injection, establishing governance guardrails, and delivering awareness training Participate in endpoint security monitoring, disaster recovery exercises, tabletop simulations, and awareness training initiatives Contribute to ongoing security operations, risk management efforts, and special security projects Qualifications 3+ years of experience in IAM, IAM operations, or security analyst roles (healthcare technology or other regulated environments preferred) Hands-on experience with identity platforms such as Okta, Azure AD, or Google IdP, plus SCIM, SAML/OIDC/OAuth, directory services, group policy, and conditional access Experience with vulnerability management platforms (Tenable, Qualys, Rapid7, AWS Inspect, Kandji) and patch orchestration workflows Working knowledge of HIPAA, HITECH, NIST CSF/800-66, and CIS Controls (familiarity with HITRUST CSF is a plus) Knowledge of cloud security basics (AWS, Azure, GCP), least-privilege IAM, and networking fundamentals (TCP/IP, DNS, HTTP, VPN, segmentation) Familiarity with endpoint security solutions (CrowdStrike Falcon, Cynet, SentinelOne) and DLP tools Familiarity with GenAI, keeping up to date with innovative security programs and artificial intelligence systems Proactive communication and documentation skills, with the ability to collaborate across technical and non-technical teams globally The US base salary range for this full-time position is $130,000.00 to $145,000.00. Salary ranges are determined by role and level. Compensation is determined by additional factors, including job-related skills, experience, and relevant education or training. Please note that the compensation details listed in US role postings reflect the salary only, and do not include equity or benefits. #LI-DNP Hello Heart has a positive, diverse, and supportive culture - we look for people who are collaborative, creative, and courageous. Oh, and if you want to see some recent evidence of the fun things we do at Hello Heart, check out our Instagram page.
    $130k-145k yearly Auto-Apply 60d+ ago
  • Senior Cyber Security Analyst

    Bayside 4.5company rating

    Cyber security analyst job in Santa Clara, CA

    reports to the Cyber Security Manager and is responsible for reviewing and analyzing threat feeds in order to assist in optimizing currently deployed tools/procedures/processes throughout the organization. Analyst must analyze escalated security incidents from linear departments to validate, understand, and create lessons learned to help strengthen the posture of the organization. Analyst must also be able to advise on IT initiatives, IT business projects, and IT engineering in regards to security industry best practice. The analyst must also have a firm understanding of penetration testing and vulnerability assessments. A strong networking background and security certifications are preferred. Qualifications Demonstrate a comprehensive understanding of security processes for installation, management, monitoring and response of enterprise networks In depth experience with Information System Security (ISS), PKI, firewalls, intrusion detection/protection and related vulnerability assessment tools for network periphery and internal network/service discovery and topology mapping Experience working with a Security Operation Center Experience in full life cycle information technology solution implementation from conceptualization, requirements, design and specification through development (coding), integration testing and commissioning Demonstrate the ability to communicate clearly, to both technical and non-technical audiences, risks, threats, and vulnerabilities identified during assessments Demonstrated understanding of TCP/IP networking Must have strong incident handling experience including knowledge of common probing and attack methods, network/service discovery, system auditing, viruses, and worms Security testing of Enterprise networks through ethical hacking Experience responding to incidents in a 24/7 environment Experience working in a fast paced industry dealing with sensitive data Demonstrate strong understanding of Windows, networking, telephony and wireless security skills
    $114k-153k yearly est. 7h ago
  • Principal Cyber Security Engineer

    Cloud Software Group 3.9company rating

    Cyber security analyst job in San Ramon, CA

    Key Responsibilities Architectural Leadership: Design, develop, and maintain the comprehensive security architecture for Cloud Software Group's products and corporate infrastructure. Cloud Security Expertise: Lead the security strategy for our cloud environments, including AWS, Azure, and Google Cloud, ensuring best practices and compliance. Security Domain Knowledge: Provide expert guidance across a broad range of security domains, including application security, network security, identity and access management (IAM), data protection, and incident response. Collaboration and Communication: Work closely with engineering, DevOps, product, and leadership teams to embed security into every stage of the software development lifecycle. Present complex security concepts to both technical and non-technical audiences. Threat Modeling & Risk Analysis: Conduct threat modeling and risk assessments to identify vulnerabilities and recommend mitigation strategies. Mentorship: Mentor and guide junior security professionals, fostering a culture of security awareness and continuous improvement. Compensation may vary depending on your location, qualifications including job-related education, training, experience, licensure, and certification, that could result at a level outside of these ranges. Certain roles are eligible for additional rewards, including annual bonus, and sales incentives depending on the terms of the applicable plan and role as well as individual performance. NY generally ranges: $190,720-$286,080 CA generally ranges: $199,012-$298,518 All other locations fall under our General State range: $165,843-$248,765 Benefits may vary depending on the nature of your employment with Cloud Software Group and the country where you work. U.S. based employees are typically offered access to healthcare, life insurance and disability benefits, 401(k) plan and company match, among others. This requisition has no specific deadline for completion. About Us: Cloud Software Group is one of the world's largest cloud solution providers, serving more than 100 million users around the globe. When you join Cloud Software Group, you are making a difference for real people, each of whom count on our suite of cloud-based products to get work done - from anywhere. Members of our team will tell you that we value passion for technology and the courage to take risks. Everyone is empowered to learn, dream, and build the future of work. We are on the brink of another Cambrian leap -- a moment of immense evolution and growth. And we need your expertise and experience to do it. Now is the perfect time to move your skills to the cloud. Cloud Software Group is firmly committed to Equal Employment Opportunity (EEO) and to compliance with all federal, state and local laws that prohibit employment discrimination. All qualified applicants will receive consideration for employment without regard to age, race, color, creed, sex or gender, sexual orientation, gender identity, gender expression, ethnicity, national origin, ancestry, citizenship, religion, genetic carrier status, disability, pregnancy, childbirth or related medical conditions (including lactation status), marital status, military service, protected veteran status, political activity or affiliation, taking or requesting statutorily protected leave and other protected classifications. Cloud Software Group will consider qualified applicants with a criminal history and conduct the recruiting process in accordance with the California Fair Chance Act, Los Angeles County Fair Chance Ordinance for Employers and San Diego Fair Chance Ordinance. For access to the laws see the following links: California FCA and Los Angeles FCO. If you need a reasonable accommodation due to a disability during any part of the application process, please contact us at **************, HR directly via ************** or email at *************** for assistance.
    $199k-298.5k yearly Auto-Apply 60d+ ago
  • INFORMATION SECURITY ANALYST

    San Jose Evergreen Community College District 3.6company rating

    Cyber security analyst job in San Jose, CA

    Opportunity Type CLASSIFIED EMPLOYMENT OPPORTUNITY Position Title INFORMATION SECURITY ANALYST Posting Number S2549 Close/First Review Date 11/16/2025 Department ITSS (Information Technology Support Services) Work Location District Office Position Status Full Time Salary Range $141,330 - $172,437 Annual Salary (Range 150: Classified Salary Schedule Fiscal Year 2025-2026). Starting placement is generally at Step 1. Benefits Summary In addition to the salary, this position qualifies for the choice of one of the District's excellent Health Benefits and Welfare plans, which the premium cost is 100% paid by the District for the employee and their eligible dependents, and one health plan costing an estimated $60,000 for the District for fiscal year 2025-2026. We offer two medical plans (Anthem Blue Cross [PPO] and Kaiser Permanente (HMO]); dental (Delta Dental PPO); vision (VSP Choice); life insurance for the employee (The Hartford); life insurance for eligible dependents (The Hartford); a long term disability/income protection plan (The Hartford); and an employee assistance plan (Anthem EAP). In addition, the District contributes an additional 26.81% of the employee's salary towards an eligible employee's pension (CalPERS). Employees may also elect to participate in optional plans including purchasing additional life insurance for themselves and their eligible dependent(s); enroll in a medical, transportation, and/or dependent care Flexible Spending Account(s) (with the $4 monthly administrative fee paid by the District); and set pre-taxed dollars aside to supplement their pension in a 403b (tax shelter annuity) and/or a 457 (deferred compensation) plan(s). Classified employees also earn 10 to 22 days per year of vacation (based on years of service), and up to 12 sick leave days (pro-rated for less than full-time positions). There are currently 20 paid holidays. Position Description POSITION SUMMARY The Information Security Analyst reports to Executive Director of ITSS (Information Technology Support Services) at the District Office. The work schedule is 12 months per year; 40 hours per week; Monday - Friday; 8:00 a.m. - 5:00 p.m. This position is represented by CSEA (California School Employees Association), Chapter 363. POSITION PURPOSE Reporting to Executive Director, ITSS or an assigned administrator, the Information Security Analyst performs complex work related to the District's information security program including testing, analysis and evaluation of the integrity and confidentiality of enterprise systems, network, assets and communication technology throughout the District. The position monitors security systems and conducts periodic risk assessments to identify, troubleshoot, diagnose, resolve and report security problems and breaches; assists in coordinating and conducting investigations involving District technology resources, and assists with security awareness training. DISTINGUISHING CHARACTERISTICS This position focuses on threat and vulnerability management with exposure and support on all aspects of the cybersecurity practice. Incumbent in this position should have advanced knowledge on risk identification, protection and compliance, threat detection, incident response plan development and annual review, and recovery services to achieve business resilience. KEY DUTIES AND RESPONSIBILITIES 1. Analyze, evaluate and implement security applications, policies, standards and procedures intended to prevent the unauthorized use, disclosure, modification, loss or destruction of data; work with the campus community and other staff to ensure the integrity and security of the information technology infrastructure. 2. Lead the development, testing and implementation of information security products and control techniques in all locations throughout the District. 3. Work with campus and district technology teams to ensure the security of all applications and assets. 4. Monitor and review security systems and logs. Identify, troubleshoot, diagnose, resolve, document and report security problems and incidents; help coordinate and conduct investigations of suspected breaches; respond to emergency information security situations. 5. Collaborate with application programming team and other IT staff to ensure production applications meet established security policies and standards. 6. Assist with training and education on information security and privacy awareness topics for District administrators, faculty and staff; assist in the development of appropriate security-incident notification procedures for District management. 7. Work with vendors to conduct vulnerability assessments to identify existing or potential electronic data and assets compromises and their sources; participate in investigative matters with appropriate law enforcement agencies. 8. Perform audits and periodic inspections of District information systems to ensure security measures are functioning and effectively utilized and recommend appropriate remedial measures to eliminate or mitigate future system compromises. 9. Review, evaluate, and recommend software products related to IT systems security, such as virus scanning and repair, encryption, firewalls, internet filtering and monitoring, intrusion detection, etc. 10. Monitor and maintain the District's security event information system (SEIM) and data loss prevention software. 11. Manage security systems and policies including but not limited to servers, firewalls, email security, and Microsoft 365 environment. 12. Recommend and implement security policies, protocols, practices and lead in creation of security training and guidance to staff. 13. Assist in the secure management and maintenance of the District's network authentication systems for wired and wireless network access. 14. Review security practices and controls of third-party service providers that handle District sensitive data, and review security controls and features of third-party software systems. 15. Ensure that maintenance, configuration, repair and patching of systems occurs on a scheduled and timely basis utilizing best practices in change management and consistent with policies and procedures. 16. Keep current with latest emerging security issues and threats through list servers, blogs, newsletters, conferences, user groups, and networking and collaboration with peers in other institutions. 17. Perform other duties reasonably related to the job classification. EMPLOYMENT STANDARD Knowledge of: 1. Compliance and industry cybersecurity standards frameworks such as NIST 800 and ISO standards. 2. Emerging technologies and the possible impact on existing information systems, instructional processes and business operations. 3. Incident response best practices and software license compliance laws. 4. Troubleshooting tools for computing hardware, servers and network equipment including but not limited to switches, routers, and firewalls. 5. Enterprise resource planning systems, Microsoft 365 and Active Directory and Azure Active Directory. 6. Principles of program design, coding, testing and implementation. 7. Advanced knowledge of desktop and server operating systems including Windows and Linux. 8. Disaster recovery and backup including business continuity planning. 9. Principles of training, support, and services to end-users. 10. General research techniques and data driven analytics. 11. Modern office administrative practices and use of tools including computers, websites and other applications related to this job. Skills and Ability to: 1. Apply current NIST and ISO standards to current operations. 2. Respond to incidents and events in a timely manner. 3. Prepare clear and concise system documentation and reports. 4. Prioritize assigned tasks and projects. 5. Communicate complicated technical issues and the risks they pose to stakeholders and management. 6. Establish and maintain effective and cooperative working relationships with others. 7. Analyze situations accurately and adopt effective course of action. 8. Coordinate, develop, and implement projects. 9. Work with attention to detail and independently with minimum supervision. Required Qualifications EDUCATION AND EXPERIENCE 1. A Bachelor's degree from an accredited institution with major course work in computer information systems, computer science, business administration, or related field. 2. Two years of experience performing information security duties, which may include implementing, overseeing, and/or managing information security technologies, process, or programs, including identification, protection, detection, response, and recovery activities. Certification: 1. Professional security or privacy certification, such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or other similar credentials. District's Diversity * Demonstrated sensitivity, knowledge and understanding of the diverse academic, socioeconomic, gender identity, sexual orientation, cultural, disability, and ethnic background of groups historically underrepresented, and groups who may have experienced discrimination. * Success integrating diversity as appropriate into the major duties outlined in the job description and in the duties listed in the District's hiring policy; or demonstrated equivalent transferable skills to do so. Desired Qualifications 1. Bilingual abilities, desirable. Foreign Degree For positions that require a degree or coursework: Degree(s) must have been awarded by a college or university accredited by an accrediting body recognized by the U.S. Council on Post-Secondary Accreditation and/or the U.S. Department of Education. All degrees and credits earned outside of the United States must have a U.S. evaluation (course by course) of the transcripts and must be submitted with the application. Degrees earned outside of the U.S. without a U.S. credential evaluation attached, will not be considered. Working Environment Physical Demands: 1. Must sit for long periods of time, use hands and fingers to operate an electronic keyboard, reach with hands and arms, and speak clearly and distinctly to ask questions and provide information, hear and understand voices over telephone and in person. 2. The physical demands described here are representative of those that must be met by an individual to successfully perform the essential functions of this job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions. About San Jose/Evergreen Community College District The District is represented by dedicated and talented employees who are passionate about providing our student population with the best educational experience possible. The District recognizes that cultural diversity in the academic environment promotes academic excellence; fosters cultural, racial and human understanding; provides positive roles models for all students, and creates an inclusive and supportive educational and work environment for its employees, students, and the community it serves. As of Spring 2024, with enrollment of approximately 15,655 students per semester, and an extremely diverse student population (Hispanic/Latino 45.20%, Black/African-American 3.45%, Asian/Pacific Islander 31.70%, American Indian/Native American 0.36%, White/Caucasian 12.76%) attaining educational goals reflecting 56% - Transfer to a 4-Year College/ University, the District's emphasis on student success makes it a recognized educational leader in the State. The District encourages a diverse pool of applicants to serve as colleagues to an existing diverse classified staff consisting of 43.9% Latinx, 25.3% Asian/Pacific Islander, 4.2% Black/African American, 0.3% American Indian/Native American, 17.9% White/Caucasian, and as well as encouraging applications from all qualified, outstanding applicants. Important Information EQUAL OPPORTUNITY EMPLOYER STATEMENT: San José-Evergreen Community College District is an Equal Opportunity Employer committed to nondiscrimination on the basis of ethnic group identification, race, color, language, accent, immigration status, ancestry, national origin, age, gender, gender identity, religion, sexual orientation, transgender, marital status, veteran status, medical condition, and physical or mental disability consistent with applicable federal and state laws. CONTACT: Employment Services, Human Resources, SJECCD 40 S. Market Street, San Jose, CA 95113 Phone: ************** Email: ******************************* Employment Website: ****************************** District Website: ************** APPLICATION PROCEDURES: Interested applicants MUST SUBMIT ONLINE ALL of the following materials by the First Review Date/Closing Date as listed on the job announcement. Applications received after the First Review Date will only be forwarded to the hiring committee at their request. 1. A completed online San José-Evergreen Community College District APPLICATION. 2. A COVER LETTER (Stating how you feel you meet the qualifications as outline in the job announcement). 3. A current RESUME/CURRICULUM VITAE 4. TRANSCRIPT - (If Required) If a degree is listed as a requirement, transcripts (Not Diplomas) MUST INCLUDE confer or award date of stated degree. Unofficial transcripts will be accepted; however if the position is offered, official transcripts will be required prior to employment. If the transcripts or degrees are from outside of the United States, an official certification of equivalency to U.S. degrees by a certified U.S. credential review service (course by course of the transcripts) MUST also be submitted. (See below for a list of suggested services that provide foreign degree equivalency evaluation to U.S. degrees). Note: Some positions may require additional documents and/or certificates, in addition to the items listed above. Please refer to the job announcement. OTHER APPLICANT INFORMATION: 1. Only complete application materials will be considered. No exceptions. 2. Letters of Recommendation are NOT required and will not be forwarded to the hiring committee. 3. Upon hire the successful candidate must provide the required documents of identity and authorization to work and attest he/she is authorized to work in the United States. 4. Application materials become the property of the District and will not be returned or duplicated. 5. Travel expenses to attend the interview are the responsibility of the candidate. 6. Meeting the minimum qualifications does NOT assure an interview. 7. The District may re-advertise, delay, choose not to fill the position, or choose to fill more than one position. Suggested services that provide foreign degree equivalency evaluation to U.S. degrees: Academic Credentials Evaluation Institute, Inc. Website: *************************** Education Records Evaluation Services Website: ************ International Education Research Foundation Website: ******************** World Education Services Website: ***********
    $141.3k-172.4k yearly Easy Apply 38d ago
  • Information Security Engineer - Generalist

    xAI

    Cyber security analyst job in Palo Alto, CA

    xAI's mission is to create AI systems that can accurately understand the universe and aid humanity in its pursuit of knowledge. Our team is small, highly motivated, and focused on engineering excellence. This organization is for individuals who appreciate challenging themselves and thrive on curiosity. We operate with a flat organizational structure. All employees are expected to be hands-on and to contribute directly to the company's mission. Leadership is given to those who show initiative and consistently deliver excellence. Work ethic and strong prioritization skills are important. All engineers are expected to have strong communication skills. They should be able to concisely and accurately share knowledge with their teammates. About the Role We are seeking a versatile and proactive Security Generalist to join our security team. In this dynamic role, you will collaborate with our Detection Engineering, Application Security, Infrastructure Security, and IT teams to enhance our security posture. As a strategic unblocker and automator, you will identify bottlenecks, streamline processes, and develop tools to improve efficiency across security operations, all while supporting our cloud-native and AI-focused infrastructure. Key Responsibilities Assist Detection Engineering by monitoring security alerts, refining detection rules, and supporting incident response efforts Support Application Security by conducting code reviews, integrating security into CI/CD pipelines, and addressing AI/ML-specific vulnerabilities Collaborate with Infrastructure Security to secure cloud architectures, maintain Infrastructure as Code (IaC) templates, and perform security assessments Partner with the IT Team to ensure secure system administration, endpoint protection, and compliance with security policies Develop automation scripts and tools to streamline security workflows and reduce manual effort across teams Act as a strategic unblocker by identifying and resolving cross-team challenges, fostering collaboration, and driving security initiatives Contribute to the creation and maintenance of security documentation, playbooks, and metrics Stay current with emerging threats, security trends, and best practices in cloud-native and AI environments Requirements Bachelor's degree in Computer Science, Cybersecurity, or a related field 1-3 years of experience in cybersecurity, with exposure to detection, application, or infrastructure security Proficiency in at least one scripting language (e.g., Python, Bash, Rust) for automation and tool development Familiarity with cloud platforms (e.g., AWS, GCP, Azure) and their security features Understanding of cybersecurity principles, common vulnerabilities, and attack vectors Strong problem-solving skills and ability to prioritize tasks in a fast-paced environment Excellent communication skills, with the ability to collaborate across technical and non-technical teams Preferred Qualifications Experience working across multiple security domains (e.g., detection, application, infrastructure) Familiarity with SIEM platforms, code analysis tools, or Infrastructure as Code (e.g., Terraform) Knowledge of AI/ML security implications, such as those outlined in the OWASP LLM Top 10 Relevant security certifications (e.g., GCIH, CSSLP, CCSP) Experience with containerized environments, Kubernetes, or DevSecOps practices Bonus Skills Experience building custom security tools or integrations to enhance security operations Contributions to open-source security projects or tools Interest in leveraging AI to automate security tasks and improve threat detection Familiarity with software supply chain security or digital forensics Annual Salary Range $150,000 - $250,000 USD Benefits Base salary is just one part of our total rewards package at xAI, which also includes equity, comprehensive medical, vision, and dental coverage, access to a 401(k) retirement plan, short & long-term disability insurance, life insurance, and various other discounts and perks. xAI is an equal opportunity employer. California Consumer Privacy Act (CCPA) Notice
    $150k-250k yearly 20d ago
  • Cyber Security Engineer III

    ACL Digital

    Cyber security analyst job in San Jose, CA

    eBay is seeking a CSIRT Engineer to join our highly visible Cyber Security Incident Response Team that provides Security Operations Center (SOC) support, cyber analysis, scripting and automation, and a 24x7x365 support staff. This specific position requires the ability to work Swing and/or Graveyard shifts with rotations into Day shift. Working within eBay's Computer Security Incident Response Team (CSIRT) you will have the opportunity to build innovative solutions to identify and mitigate information-security threats. You will work collaboratively to creatively solve complex security problems in a heterogeneous environment. With your contributions, we're building the best security incident response team in the industry. Your skills, vision, tenacity, and passion will help us defend and respond daily to keep eBay's critical information assets away from threats and hackers. Candidates must have extensive experience working with various security methodologies and processes, advanced knowledge of TCP/IP protocols, extensive experience providing analysis and trending of security log data from a large number of heterogeneous security devices. Must demonstrate expert knowledge in one (1) or more of the following areas: Incident Response, Digital Forensics, Monitoring and Detection, Cyber Intelligence Analysis Core Job Functions Include: Investigations - Investigating computer and information security incidents to determine extent of compromise to information and automated information systems Escalations - Responding to escalated events from security tooling to develop/execute security controls, Defense/countermeasures to prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Research - Researching attempted or successful efforts to compromise systems security and designs countermeasures. Education - maintaining proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption. Communications - Provides information and updates to shift leads & leadership, creates pass-downs for next shift, work closely with supporting teams, provide feedback for new security policy and standards, engage with other teams and adjacencies through email and conference calls. Digital Forensics - As it relates to information systems, performs HR investigations and legal holds in a forensically sound manner. Consults with HR and legal subject matter experts to adhere to local country law Coverage - Must be willing to perform shift work, weekends, and holidays as well as participate in a rotating shift consisting of four (4) 10 hour shifts with four days on, three (3) days off and possible rotations across Day, Swing, and Graveyard shifts as needed. To be successful in this position, you should be proficient with: Incident Response - Getting people to do the right thing in the middle of an investigation. Offensive Techniques - Penetration testing, IOCs, and exploits at all layers of the stack. Logs - you should be comfortable with a SEIM to be able to gather and analyze logs to recreate incidents and hunt for threats. System Forensics - Basic understanding of image acquisition techniques, memory forensics, and the like. Networking Fundamentals - TCP/IP Protocols (HTTP, DNS, FTP, DHCP, ARP, etc.), and Wireshark/TCPDump. Scripting - Should be familiar with scripting in at least one of the following: python, perl or a similar language. Risk Analysis - Taking a vulnerability in a particular environment and understanding the practical associated risk. Qualifications: Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or a related field. Minimum three (3) years of professional experience in incident detection and response, malware analysis, or digital forensics. Must have at least one (1) of the following certifications: SANS GIAC: GCED, GCIA, GPEN, GWAPT, GSNA, GPPA, GAWN, GWEB, GNFA, GREM, GXPN, GMON, GCIH ISC2: CCFP, CCSP, CISSP Cisco: CCNA, CCNP CERT: CSIH EC Council: CEH, ENSA, CNDA, ECSS, ECSP, ECES, CHFI, LPT, ECSA, or ECIH Offensive Security: OSCP, OSCE, OSWP and OSEE Digital Forensics: EnCE, CB, MiCFE, ACE, GCFA, GCFE In addition, a minimum of one (1) year of specialized experience in one or more of the following areas: Security Assessment or Offensive Security Application Security Security Operations Center/Security Incident Response Cyber intelligence Analysis At eBay, your work makes a difference. We believe that we can build a better form of commerce that is enabled by people, supported by technology, and open to everyone - creating more opportunity for all. Will this candidate interface with IT and business teams? If so, which internal/external groups? Operation role Incident response and security operations team - service requests, alerts, data loss events, malware technical investigates to tirage the events Not a senior role- analyst that makes initial triage of the events wider not deeper knowledge of the space Security background- know the basics of information security-does not need to be a SOC analyst looking for diverse skillsets Shift based job not operational - 3 site structure west coast, EMEA, and east coast can apply this resource to either site hence Preference on West coast PST 3 month training and onboarding period- will take an exam towards the end of the onboarding Required Skills (top 3 to 5/ non-negotiables): What you like to see on resumes? (nice to have) 1 . * Solid sort of security domain background - experience education, certifications Security analyst, Malware analyst, Security engineering/Admin, threat research knowledge etc. Does this individual have the tech evidence to discuss how they used it in their previous job - more on the analyst 1 . Coding knowledge 2 . * Excellent communication skills as this worker will be working cross functionally with tech and non-IT teams within the space 2 . Admin knowledge 3 . * SQL, SPL Query and Languages and Coding 3 . Pen testing knowledge 4 . * Can work on a variety of tools as this team uses a lot of home-built tools 4 . * These people would have more of a possible to extend/convert to FTE 5 5 . . Disqualifiers or Dislikes on Resumes: No investigation experience and cannot discuss how they conducted the investigations Taking and Admin or dev resume and inject it into their resume/experience - need to have the direct experience and able to explain that within the interview Education Requirement: Bachelor's degree not needed they are really looking for a person with the hard skills Minimum 2-3 years Security experience as long as they have the hard skills If they are just now coming into Security then 5-7 years Required Testing: Security analyst, Malware analyst, Security engineering/Admin, threat research knowledge etc. Software Skills Required: SQL, SPL, Splunk, etc. Required Certifications: Should have 1 or more in the JD if they are in this space Preferred companies/industries: Open to all Candidate Value Proposition: If worker does well, they have a high chance of extension and conversion Difficult Aspects of Role: Night and weekend shifts, rotational shifts. May be difficult if they have a family so be transparent on the schedule up front, more discussions will be had in the interview with the manager Team Environment How many people are on your team? Junior, Mid or Senior Level? Lean team 8-9 members Will be working with Core engineers that works in those time zones Allow rotations and flexibility 3 months to ramp up give or take Morning daily stand up - will only apply for the region they are hired into Shift attendance is paramount but can be flexible but is a monitoring role
    $102k-145k yearly est. 60d+ ago
  • Information System Security Officer (ISSO)

    Amentum

    Cyber security analyst job in Sunnyvale, CA

    Amentum is seeking an Information System Security Officer (ISSO) for a contract at the National Aeronautics and Space Administration (NASA) Ames Research Center. The ISSO provides security Subject Matter Expertise (SME) supporting NASA information systems. Compensation & Benefits HIRING SALARY RANGE: $145,000 - $175,000 (Salary to be determined by the education, experience, knowledge, skills, and abilities of the applicant internal equity, and alignment with market data.) Amentum is a leading provider of engineering, scientific, and program management support services to some of the top agencies in the U.S. government, including the Defense Advanced Research Projects Agency (DARPA), NASA, the Department of Homeland Security, and the Intelligence Community. This is a full-time position based at Moffet Field in Mountain View, CA. Job Duties and Responsibilities: Provide technical guidance to address the adequacy and effectiveness of information security policies, procedures, and practices. Review cyber intelligence threats reports, including but not limited to SOC MARs, SARs, and DHS/CISA Emergency Directives, in order to identify threats to the information system, develop mitigations, and ensure vulnerabilities that require immediate attention are remediated. Assist the Information System Owner (ISO) and Information System Security Manager (ISSM) in ensuring that all components of the information system are appropriately updated and patched in accordance with Federal and NASA requirements. Evaluate cloud service providers' security posture and develop associated recommendations for restrictions, conditions and control responsibility parsing. Support the Assessment and Authorization (A&A) process through the development and updating of the following: System Security Plan, Contingency Plan, Disaster Recovery Plans, Risk Assessment Report, annual review package, work instructions, policies, and procedural guides affecting the overall IT and security posture of the environment within the NASA Risk Information Security Compliance System (RISCS) system. Develop and maintain detailed and accurate System Security Plans (SSP), including security documentation for component and interface specifications, to support appropriate cybersecurity and privacy throughout the information systems' life cycle Write Plan of Action and Milestones (POA&M's) and Risk Based Decisions (RBD's) for the SSP controls. Support the Government with identifying and prioritizing essential system functions or sub-systems required to support essential capabilities or business functions for restoration or recovery after a system failure or during a system recovery event based on overall system requirements for continuity and availability. Ensure contingency plans and system controls are reviewed and tested in accordance with agency requirements. Analyze system logs to identify potential issues. Perform routine audits of systems and applications. Ensure Privacy Threshold Assessments (PTA) and Privacy Impact Assessments (PIA) are conducted as required. Provide IT security support to communication systems as needed. Serve as a technical resource to other IT and security professionals. Required Qualifications: Must have an active Top Secret US Government Clearance, with the ability to obtain an SCI Clearance. Note: US Citizenship is required to obtain a Government Clearance. Batchelor's degree with a minimum of 5 years of professional experience in cybersecurity design and development activities. Ability to provide practical and creative solutions in a dynamic work environment, while working effectively with a team. Ability to handle multiple tasks and prioritize effectively in a rapidly evolving environment. Desired qualifications: An active SCI US Government Clearance, with the ability to obtain an SCI Clearance. Note: US Citizenship is required to obtain a SCI Clearance. Experience in NASA security or served as an ISSO in other Government agencies. Experience in NASA Assessment and Authorization (A&A) process. Experience in NASA Risk Information Security Compliance System (RISCS) tool. risk information security compliance system and assessment and authorization. Experience with cloud services. Experience with classified networks. Candidates should be self-starters capable of working both independently and as part of a team. Certification level to meet DoD 8140 IAT or DoD 8570 IAT Level II certification or higher. Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, sex, sexual orientation, pregnancy (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, ancestry, United States military or veteran status, color, religion, creed, marital or domestic partner status, medical condition, genetic information, national origin, citizenship status, low-income status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal laws and supplemental language at Labor Laws Posters.
    $145k-175k yearly Auto-Apply 60d+ ago
  • Cyber Security Engineer

    Talentburst 4.0company rating

    Cyber security analyst job in San Jose, CA

    ** 9 time INC 500/5000, 9 time BBJ "Pacesetter ", 5 time SIA-fastest growing** ___________________________________________________________ Kashif Meraj | TalentBurst, Inc. Boston | San Francisco | Miami | Milwaukee | Toronto | New Delhi | Bangalore Work: ************** 575 Market Street, Suite 3025 | San Francisco, CA 94105 | ******************* Certified Minority Business Enterprise (MBE) Job Description Job Title: IT Security Engineer Location: San Jose, CA 95110 Duration: 6 Months+ Responsibilities: • Work with Client's Identity and Access Management team to administer and implement appropriate security controls and workflows. • Work with various internal employees to help train and educate on good security practices and specifics about end-user security tools. • Work with a team of Security Engineers to handle incoming requests, respond to issues, troubleshoot reported problems, and identify solutions. • Work closely with the teams that provisions, customizes, monitors, manages and upgrades our enterprise password vault solution. • Communicate with customers to address their security requirements and provide guidance. Requirements: • Experience with and understanding of enterprise password vault configurations and automations. Specific CyberArk experience is preferred Additional Information Please reach me for further query or drop your updated resume at ***********************************
    $99k-136k yearly est. Easy Apply 60d+ ago
  • Product Security Engineer, Operating System

    1X Technologies As

    Cyber security analyst job in Palo Alto, CA

    About 1X We're an AI and robotics company based in Palo Alto, California, on a mission to build a truly abundant society through general-purpose robots capable of performing any kind of work autonomously. We believe that to truly understand the world and grow in intelligence, humanoid robots must live and learn alongside us. That's why we're focused on developing friendly home robots designed to integrate seamlessly into everyday life. We're looking for curious, driven, and passionate people who want to help shape the future of robotics and AI. If this mission excites you, we'd be thrilled to hear from you and explore how you might contribute to our journey. Role Overview We are seeking a Product Security Engineer with expertise in operating system security to strengthen the foundation of our robotics platform. In this role, you will design and implement critical security features such as secure boot, trusted execution environments, and system service hardening. You will ensure that sensitive operations and data remain protected while enabling developers to maintain security best practices. This role will directly influence the resilience and trustworthiness of our robotics systems. Responsibilities Develop and maintain secure critical services for Linux system Implement secure boot chains from fused hardware keys, ensuring verified OS and data partitions with rollback protection Integrate OP-TEE to safeguard sensitive assets such as mTLS certificates and disk encryption keys Harden system services using least-privilege operations, systemd features, namespacing, and syscall filtering Build hardening templates and automation tools to streamline security boundary enforcement for developers Automate security validation processes within CI/CD pipelines Design and enforce device access controls for Linux systems Job requirements Experience contributing and shipping C/C++ code (or similar) to production Strong experience with Linux operating system internals and security mechanisms Hands-on expertise with secure boot and verified boot implementations Familiarity with Trusted Execution Environments (e.g., OP-TEE or similar) Proven track record of applying least-privilege principles and hardening root-level services Proficiency with systemd and sandboxing, including namespacing, privilege restrictions, syscall filtering, and other techniques Experience designing security tools, automation, and templates for developers Knowledge of device access control and Linux permissions management Solid understanding of CI/CD integration for security validation Experience with NVIDIA Orin or similar SoC platform preferred Expertise in software development, including code auditing Benefits & Compensation Health, dental, and vision insurance 401(k) with company match Paid time off and holidays Equal Opportunity Employer 1X is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, ancestry, citizenship, age, marital status, medical condition, genetic information, disability, military or veteran status, or any other characteristic protected under applicable federal, state, or local law. On-site Palo Alto, California, United States $137,861 - $240,000 per year Software EngineeringAll done! Your application has been successfully submitted! Other jobs
    $137.9k-240k yearly 60d+ ago
  • Staff Security Engineer - Third Party Security

    Linkedin 4.8company rating

    Cyber security analyst job in Sunnyvale, CA

    LinkedIn is the world's largest professional network, built to create economic opportunity for every member of the global workforce. Our products help people make powerful connections, discover exciting opportunities, build necessary skills, and gain valuable insights every day. We're also committed to providing transformational opportunities for our own employees by investing in their growth. We aspire to create a culture that's built on trust, care, inclusion, and fun - where everyone can succeed. Join us to transform the way the world works. Job Description At LinkedIn, our approach to flexible work is centered on trust and optimized for culture, connection, clarity, and the evolving needs of our business. The work location of this role is hybrid, meaning it will be performed both from home and from a LinkedIn office on select days, as determined by the business needs of the team. This role will be hybrid in LinkedIn's Sunnyvale campus. Qualifications About the team LinkedIn's members entrust us with their information every day and we take their security seriously. Our core value of putting our members first powers all the decisions we make, including how we manage and protect the data of our members and customers. We never stop working to ensure LinkedIn is secure. We follow industry standards and have developed our own best practices to stay ahead of the increasing number of threats facing all Internet services and infrastructure. LinkedIn is looking for a Staff Security Engineer to be an integral part of our Information Security organization. LinkedIn's Third-Party Security team provides security architecture and design services across the organization as we scale our platform to support 700M+ members worldwide. Our vision is to appropriately secure all third-party solutions and services that power the LinkedIn experience and the tooling that enables our engineers. We partner closely with stakeholders across the business to make it easy and efficient for LinkedIn teams to onboard third parties securely, while maintaining the high standards of trust our members expect. We are looking for an engineer who can help LinkedIn continue its journey of innovation and keep us at the forefront as an organization worthy of the trust people place in us. As a third party security engineer, you will own the security risk posture of partner engineering organizations, supplier integrations, and enterprise third-party solutions. You will focus on shifting security engagement to the left, ensuring that third-party technologies, integrations, and enterprise platforms are secure, compliant, and resilient. You will build and maintain strong relationships with partner teams while driving a frictionless engagement model with the Security organization. Responsibilities * Partner with architects, engineers, and site reliability engineers; you will build threat models, design secure systems, and perform security design assessments that highlight risks and actionable mitigations. * Lead third-party and supplier security reviews; you will evaluate high-risk integrations (APIs, SaaS, AI/ML platforms, enterprise third-party solutions, and cloud services) for architecture, data handling, and compliance alignment. * Develop proof-of-concepts (POCs); you will validate security recommendations in the company's tech stack and ensure practicality of adoption. * Assess new and existing SaaS applications and deployments for vulnerabilities and design flaws, and prioritize remediation efforts based on risk. * Communicate risk decisions effectively; you will influence both technical architecture and business decisions. * Drive security initiatives; you will ensure risks within partner organizations and enterprise third-party platforms are tracked, managed, and remediated. * Build security champions; you will identify and coach Security "Champions" within partner teams to scale security knowledge and accountability. * Mentor and develop team members; you will help strengthen both technical expertise and interpersonal influence skills. Additional Information Basic Qualifications * BA/BS Degree in Computer Science, cybersecurity, Information Technology, or related technical discipline, or related practical experience. * 4+ years experience in information security principles such as threat modeling, third party security, security architecture, secure system design, system and network security, big data security, authentication and security protocols, or cryptography * 4+ years experience and in-depth knowledge of enterprise security tools * Experience with security in cloud environments Preferred Qualifications * MS in Computer Science or equivalent * 7+ years of experience in threat modeling, third party security, security architecture, secure system design, system and network security, big data security, authentication and security protocols, and cryptography * 7+ years of experience in data security, network security, CI/CD security, and control plane security * 4+ years of experience in linux deployments * 4+ years of experience with scripting languages such as python * Experience working in organizations securing massively scaled networks and systems * Ability to work across teams and communicate concisely and clearly to partners * You thrive in taking initiative and helping set direction when needed and adapt well to an ever evolving environment Suggest Skills * Security Architecture * Thread Modeling * Third Party Security * Technical Leadership You will Benefit from our Culture We strongly believe in the well-being of our employees and their families. That is why we offer generous health and wellness programs and time away for employees of all levels. LinkedIn is committed to fair and equitable compensation practices. The pay range for this role is $152,000 - $248,000. Actual compensation packages are based on a wide array of factors unique to each candidate, including but not limited to skill set, years & depth of experience, certifications and specific office location. This may differ in other locations due to cost of labor considerations. The total compensation package for this position may also include annual performance bonus, stock, benefits and/or other applicable incentive compensation plans. For additional information, visit: ************************************** Equal Opportunity Statement We seek candidates with a wide range of perspectives and backgrounds and we are proud to be an equal opportunity employer. LinkedIn considers qualified applicants without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, marital status, pregnancy, sex, gender expression or identity, sexual orientation, citizenship, or any other legally protected class. LinkedIn is committed to offering an inclusive and accessible experience for all job seekers, including individuals with disabilities. Our goal is to foster an inclusive and accessible workplace where everyone has the opportunity to be successful. If you need a reasonable accommodation to search for a job opening, apply for a position, or participate in the interview process, connect with us at accommodations@linkedin.com and describe the specific accommodation requested for a disability-related limitation. Reasonable accommodations are modifications or adjustments to the application or hiring process that would enable you to fully participate in that process. Examples of reasonable accommodations include but are not limited to: * Documents in alternate formats or read aloud to you * Having interviews in an accessible location * Being accompanied by a service dog * Having a sign language interpreter present for the interview A request for an accommodation will be responded to within three business days. However, non-disability related requests, such as following up on an application, will not receive a response. LinkedIn will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by LinkedIn, or (c) consistent with LinkedIn's legal duty to furnish information. San Francisco Fair Chance Ordinance Pursuant to the San Francisco Fair Chance Ordinance, LinkedIn will consider for employment qualified applicants with arrest and conviction records. Pay Transparency Policy Statement As a federal contractor, LinkedIn follows the Pay Transparency and non-discrimination provisions described at this link: ******************************** Global Data Privacy Notice for Job Candidates Please follow this link to access the document that provides transparency around the way in which LinkedIn handles personal data of employees and job applicants: ********************************************
    $152k-248k yearly 15d ago
  • Security Engineer - D&R

    Figure 4.5company rating

    Cyber security analyst job in San Jose, CA

    Figure is an AI robotics company developing autonomous general-purpose humanoid robots. The goal of the company is to ship humanoid robots with human level intelligence. Its robots are engineered to perform a variety of tasks in the home and commercial markets. Figure is headquartered in San Jose, CA. We are looking for a Security Engineer to join the Security & Privacy team at Figure, focusing on designing, implementing, and managing the detection and response tooling and processes. Responsibilities: Design, pilot, and implement central logging and alerting systems to detect malicious activity on Figure's infrastructure, including endpoints, networks, labs, and cloud environments Develop tools and automation strategies to improve Figure's ability to hunt threats and respond to incidents Participate in team operations, such as investigating events generated by the alerting pipeline and triage potential incidents, and drive response efforts in case of an active incident Identify, analyze, and build threat intelligence on relevant trends in adversary tactics, techniques, and procedures (TTPs) for sophisticated threat actors spanning APTs and cybercrime. Requirements: Experience several of the following detection and response areas: digital forensics, malware analysis, incident management, host/network intrusion detection, threat intelligence Demonstrated knowledge in threat hunting and developing logic to automate threat detection and incident response Work record of collaborating with internal and external stakeholders at all levels of a company Practical experience in a BeyondCorp model Strong software engineering (beyond scripting or automation) skills in C/C++, Rust, Golang, Python or similar Solid knowledge of operating system internals (Linux, Windows, mac OS), and experience with detection in Cloud environments (Azure, GCP, AWS) Bachelor of Science in Computer Science, Engineering, Information Systems, or equivalent years of experience in a related technical field 6+ years of experience in the field of security monitoring or related security role Excellent verbal and written communication skills, with high attention to detail The US base salary range for this full-time position is between $150,000 - $350,000 annually. The pay offered for this position may vary based on several individual factors, including job-related knowledge, skills, and experience. The total compensation package may also include additional components/benefits depending on the specific role. This information will be shared if an employment offer is extended.
    $150k-350k yearly Auto-Apply 60d+ ago
  • AMD-XILINX: DLP Enterprise Information Security Engineer

    Elevated Resources

    Cyber security analyst job in San Jose, CA

    The Enterprise Information Security Engineer will be responsible for identifying and defining requirements and engineering solutions to solve the existing threats and security issues of a global organization. This role will focus heavily on data protection, leading advancements in data loss prevention, automating processes and changing how AMD protects data going forward.
    $111k-157k yearly est. 60d+ ago
  • Cloud Security Analyst-AWS or Azure, Devops

    360 It Professionals 3.6company rating

    Cyber security analyst job in San Ramon, CA

    Hands-on cloud security engineer who has a deep understanding of emerging technologies including Openstack, PaaS - Pivotal cloud foundry, Mesos, Docker container, Security, Software defined networks, Cloud integration technologies. Hands-on deployment of AWS\Azure IaaS components necessary to support the Cyber Security deployment needs, as well as approved Cyber Security specific solutions in the AWS\Azure environment to support these efforts. Qualifications Bachelor's Degree in STEM and/or a minimum of 4 years of equivalent experience Minimum of 6 years of experience of application design and architecture Minimum of 6 years of experience with deployment of cloud controls for infrastructure, platform, and applications (IaaS/SaaS/PaaS) AWS and Azure experience a must Additional Information All your information will be kept confidential according to EEO guidelines.
    $85k-112k yearly est. 60d+ ago
  • CAD Security Systems Engineer

    Beacon Communications 3.9company rating

    Cyber security analyst job in Sunnyvale, CA

    JOB FUNCTION/PURPOSE: The CAD Security Systems Engineer is responsible for the design, engineering, and implementation of physical security systems across client and internal projects. This role works closely with Pre-Construction and Operations teams to interpret project specifications and drawings, determine optimal system layout, and develop detailed installation drawings to support successful project execution. The Engineer will design and layout electronic security systems including access control, video surveillance (CCTV), intrusion detection and may also assist with intercom, nurse call, paging, and A/V systems. Utilizing deep system knowledge, AutoCAD, and other design tools, the Security Systems Engineer plays a critical role in ensuring a seamless transition from engineering to operations. The role supports effective collaboration between Pre-Construction, Solutions Management, and Engineering teams to deliver reliable, compliant, and high-performing integrated security solutions for awarded projects. KEY ACCOUNTABILITIES: Conduct detailed site assessments to identify security risks, environmental considerations, and operational requirements. Develop comprehensive physical security system designs, including CCTV, access control, intrusion detection, intercom, duress, and perimeter protection. Create system layouts, riser diagrams, wiring schematics, device placement plans, and bills of material using CAD or similar tools. Specify appropriate hardware and technologies, including camera types and placement, access control devices (readers, locks, credentials), and network components. Design systems that are scalable, integratable with third-party platforms, and aligned with IT infrastructure and cybersecurity best practices. Ensure all designs comply with applicable codes, standards, and regulations (e.g., NFPA 731, UL 294, NEC, ADA, FIPS 201). Coordinate closely with architects, general contractors, and other trades to integrate systems into building designs and construction timelines. Perform technical evaluations of manufacturers, products, and designs to ensure optimal performance and value. Prepare technical documentation for bidding, permitting, construction, and client approval, including scopes of work and installation details. Support peer reviews and participate in design workshops to validate concepts and identify improvement opportunities. Build and maintain subcontractor relationships. Collaborate with project managers, general contractors, IT teams, and vendors to align project scope, timelines, and milestones. Participate in design reviews and construction planning sessions. Maintain accurate and complete system documentation including as-builts, configuration records, and asset tags. Assist with on boarding of new employees. OPERATE AS ONE TEAM: Build strong win-win relationships with other departments within Beacon. JOB QUALIFICATIONS: Knowledge: In-depth understanding of physical security systems including access control, CCTV, intrusion detection, intercom, and related technologies. Familiarity with industry standards and codes such as UL 294, NFPA 731, NEC, ADA, and NIST. Working knowledge of low-voltage systems. Knowledge of building construction, system integration practices, and coordination with other trades. Experience with major security platforms (e.g., Lenel, Avigilon, Software House) is highly preferred. Skills and Abilities Proficient in AutoCAD, Revit, Bluebeam, or other design/drafting software for producing system layouts and construction drawings. Strong analytical and problem-solving skills with a detail-oriented mindset. Ability to interpret technical drawings, project specifications, and floorplans. Effective communication skills, both written and verbal, for coordination with internal teams, vendors, and clients. Ability to manage multiple tasks and projects under tight deadlines. Collaborative mindset with the ability to work across engineering, pre-construction, and operations teams. Comfortable working in both office and construction site environments. Must understand implicit instructions and react favorably in all work situations. Capable of producing accurate documentation including BOMs, riser diagrams, and installation packages. Must be able to communicate providing verbal feedback in a professional manner. Education: Bachelors degree in electrical engineering, Security Engineering, or a related field; equivalent work experience may be considered. 37 years of experience in security systems engineering or low-voltage design. Certifications on low voltage systems. WORK ENVIRONMENT: This position is a hybrid role after the initial onboarding phase has been completed. Must be in the office three times a week, with one of the days being Monday or Friday. A work environment can be an office environment, medical facility, educational facility, or a customer site under construction, renovation, or warehouse space. Job sites will have a variety of environmental factors including but not limited to noise, dust, and temperature changes. Candidates must have the capability to transfer job sites, as necessary. ESSENTIAL FUNCTIONS: Requires prolonged sitting, standing, some bending, stooping, and stretching. Requires manual dexterity and eye-hand coordination for data input. Occasionally lift and carry items weighing up to fifty pounds. Must maintain a clear background check to satisfy customer job site badging requirements. Must be willing to submit to all vaccinations and screening tests required for customer jobsite badging protocol. Maintain a clear drug and alcohol screening protocol. This does not list all the duties of the job. Supervisors or management may ask you to perform other instructions and duties. You will be evaluated in part based upon your performance of the tasks listed in this . Management has the right to revise this description at any time. The job description is not a contract for employment, and either you or the employer may terminate employment at any time, for any reason as outlined in the employee manual or other written agreement. An Equal Opportunity Employer We do not discriminate based on race, color, religion, national origin, sex, age, disability, genetic information, or any other status protected by law or regulation. It is our intention that all qualified applicants are given equal opportunity and that selection decisions be based on job-related factors.
    $108k-151k yearly est. 60d+ ago
  • Information Security Engineer I - Full Time

    Washington Hospital 4.0company rating

    Cyber security analyst job in Fremont, CA

    Salary Range: $46.86 - $63.25 Summary of Duties: Evaluates, builds, tests, operates and supports a wide variety of enterprise level information security systems and tools. Develops technical security standards and drives implementation of them within the organization. Educational Requirements: Bachelor's degree in Computer Science or related field required or equivalent combination of education and experience. Experience Requirements: Must have hands-on experience with many enterprise-level information security systems. Examples: anti-virus, encryption, SSO, intrusion detection. Washington Hospital Health System does not utilize any form of electronic chatting, such as Google chat for the purposes of interviewing candidates for employment. If you are contacted by any entity or individual attempting to engage you in this format, do not disclose any personal information and contact Washington Hospital Healthcare System.
    $46.9-63.3 hourly Auto-Apply 55d ago
  • Information Security Analyst

    Teledyne 4.0company rating

    Cyber security analyst job in Mountain View, CA

    **Be visionary** Teledyne Technologies Incorporated provides enabling technologies for industrial growth markets that require advanced technology and high reliability. These markets include aerospace and defense, factory automation, air and water quality environmental monitoring, electronics design and development, oceanographic research, deepwater oil and gas exploration and production, medical imaging and pharmaceutical research. We are looking for individuals who thrive on making an impact and want the excitement of being on a team that wins. **Job Description** **Make an impact where security meets innovation.** At Teledyne RF & Microwave, we design and deliver advanced technologies that power aerospace, defense, and communications worldwide. Our team thrives on precision, collaboration, and a commitment to protecting critical systems. If you're passionate about cybersecurity and want to work for a trusted leader in high-tech solutions, this role is for you. **What you'll do** + Maintain the security posture of classified systems in line with approved policies + Verify implementation of security controls and keep documentation current + Manage system accounts and ensure proper authorization procedures + Conduct regular system assessments and report findings to the ISSM + Monitor audit logs and analyze user activity for compliance + Respond to security incidents and oversee recovery processes + Notify ISSM of system changes that impact authorization + Support hardware maintenance, backups, and virus updates + Train employees on internal security policies and assist with spill containment + Participate in configuration control activities when designated **What you need** + Strong problem-solving and organizational skills (required) + Ability to analyze security data and enforce compliance (required) + Excellent communication and teamwork skills (required) + U.S. citizenship and eligibility for security clearance (required) + Bachelor's degree in Information Systems or Security+ certification (required) + Experience with classified systems and security audits (advantage) + Familiarity with DAAPM and ITPSO policies (advantage) + Hands-on technical competence with system administration (advantage) **What we offer** + Competitive pay and comprehensive health benefits + 401(k) with company match and retirement plans + Paid time off and flexible work arrangements + Professional development and training opportunities + Employee wellness programs and assistance resources + A collaborative environment working on mission-critical technology **What happens next** Apply online through Teledyne's careers page. If your qualifications align, our team will contact you for interviews and guide you through the clearance process. _Teledyne is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status._ **Salary Range:** $61,600.00-$82,100.000 **Pay Transparency** The anticipated salary range listed for this role is only an estimate. Actual compensation for successful candidates is carefully determined based on several factors including, but not limited to, location, education/training, work experience, key skills, and type of position. Teledyne and all of our employees are committed to conducting business with the highest ethical standards. We require all employees to comply with all applicable laws, regulations, rules and regulatory orders. Our reputation for honesty, integrity and high ethics is as important to us as our reputation for making innovative sensing solutions. Teledyne is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other characteristic or non-merit based factor made unlawful by federal, state, or local laws. You may not realize it, but Teledyne enables many of the products and services you use every day **.** Teledyne provides enabling technologies to sense, transmit and analyze information for industrial growth markets, including aerospace and defense, factory automation, air and water quality environmental monitoring, electronics design and development, oceanographic research, energy, medical imaging and pharmaceutical research.
    $61.6k-82.1k yearly 48d ago
  • Principal Cyber Security Engineer

    A10 Networks 4.8company rating

    Cyber security analyst job in San Jose, CA

    A Principal Cyber Security Engineer is a seasoned, hands-on role responsible for monitoring an organization's networks, systems, applications, external industrial events, and trends for security threats. This role involves analyzing and developing tools in python for security data, identifying Vulnerabilities, and responding to security incidents. Cyber Security Analysts work closely with other security professionals to maintain the organization's security posture. Principal Cyber Security Engineer has the following responsibilities: * Monitor networks, systems, and applications for security threats * Develop security tools programming in python to protect applications against security threats * Perform Threat Hunting using industry and A10 specific datasets to * identify threats to the company and our customers * Incident Response for threats against the company and our customers * Monitor industry trends in various areas of cybersecurity * Provide cybersecurity direction through insightful writeups and presentations * Conduct periodic penetration tests and vulnerability assessments Principal Cyber Security Engineer requires the following skills: * Master's degree in Computer Science or Information Technology, or a related field with 5+ years in Cyber Security with 10+ years overall experience * 1+ years python programming experience * Knowledge of security principles and best practices * Understanding of Threat Hunting methods * Basic ELK stack expertise * Operational familiarity with an array of host, application, cloud and network cybersecurity technologies * Threat Intelligence and other Open source intelligence * Basic binary reverse engineering using tools like Ghidra or IDA * IP networking troubleshooting and design * Knowledge of programming languages such as Python and Go * Operational understanding of penetration testing tools * Proven track record of identifying and remediating cybersecurity threats * Analytical and problem-solving skills * Excellent communication and interpersonal skills Principal Cyber Security Analyst may use the following tools and software: * Security information and event management (SIEM) systems * Intrusion detection/prevention systems (IDS/IPS) * Firewalls and other Network security appliances * Vulnerability scanners and penetration testing tools * Malware analysis tools * Forensic tools * Programming languages, such as Python and Go Preferred Certifications: CompTIA Security+, CEH, or GIAC A10 Networks is an equal opportunity employer and a VEVRAA federal subcontractor. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability status, protected veteran status, or any other characteristic protected by law. A10 also complies with all applicable state and local laws governing nondiscrimination in employment. #LI-AN1 Compensation: up to $220K USD
    $220k yearly Auto-Apply 33d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Tracy, CA?

The average cyber security analyst in Tracy, CA earns between $75,000 and $145,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Tracy, CA

$104,000
Job type you want
Full Time
Part Time
Internship
Temporary