Post job

Cyber security analyst jobs in West Sacramento, CA

- 34 jobs
All
Cyber Security Analyst
Security Engineer
Information Security Engineer
Senior Security Engineer
Senior Security Analyst
Information Security Analyst
Information Systems Security Officer
Defense Analyst
Cyber Security Engineer
  • Cyber Defense Forensics Analyst

    EY 4.7company rating

    Cyber security analyst job in Sacramento, CA

    At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better. Join us and build an exceptional experience for yourself, and a better working world for all. The exceptional EY experience. It's yours to build. EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities. Today's world is fuelled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value. **The opportunity** Cyber Triage and Forensics (CTF) Incident Analyst will work as a senior member of the technical team responsible for security incident response for EY. The candidate will work as an escalation point for suspect or confirmed security incidents. Responsibilities include performing digital forensic analysis, following security incident response standard methodologies, malware analysis, identify indicators of compromise, support remediation or coordinate remediation efforts of a security incident, and develop documentation to support the security incident response process. **Your key responsibilities** + Investigate, coordinate, bring to resolution, and report on security incidents as they are brought up or identified + Forensically analyze end user systems and servers found to have possible indicators of compromise + Analysis of artifacts collected during a security incident/forensic analysis + Identify security incidents through 'Hunting' operations within a SIEM and other relevant tools + Interface and connect with server owners, system custodians, and IT contacts to pursue security incident response activities, including: obtaining access to systems, digital artifact collection, and containment and/or remediation actions + Provide consultation and assessment on perceived security threats + Maintain, manage, improve and update security incident process and protocol documentation + Regularly provide reporting and metrics on case work + Resolution of security incidents by identifying root cause and solutions + Analyze findings in investigative matters, and develop fact based reports + Be on-call to deliver global incident response **Skills and attributes for success** + Resolution of security incidents by identifying root cause and solutions + Analyze findings in investigative matters, and develop fact-based reports + Proven integrity and judgment within a professional environment + Ability to appropriately balance work/personal priorities **To qualify for the role you must have** + Bachelors or Masters Degree in Computer Science, Information Systems, Engineering or a related field + 5+ years experience in incident response, computer forensics analysis and/or malware reverse engineering; + Understanding of security threats, vulnerabilities, and incident response; + Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis; + Be familiar with legalities surrounding electronic discovery and analysis; + Experience with SIEM technologies (i.e. Splunk); + Deep understanding of both Windows and Unix/Linux based operating systems; **Ideally, you'll also have** + Hold or be willing to pursue related professional certifications such as GCFE, GCFA or GCIH + Background in security incident response in Cloud-based environments, such as Azure + Programming skills in PowerShell, Python and/or C/C++ Understanding of the best security practices for network architecture and server configuration **What we look for** + Demonstrated integrity in a professional environment + Ability to work independently + Have a global mind-set for working with different cultures and backgrounds + Knowledgeable in business industry standard security incident response process, procedures, and life cycle + Excellent teaming skills + Excellent social, communication, and writing skills **What we offer you** The compensation ranges below are provided in order to comply with United States pay transparency laws. Other geographies will follow their local salary guidelines, which may not be a direct conversion of published US salary range/s. At EY, we'll develop you with future-focused skills and equip you with world-class experiences. We'll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn more . We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $87,700 to $164,000. The salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $105,200 to $186,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year. Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being. **Are you ready to shape your future with confidence? Apply today.** EY accepts applications for this position on an on-going basis. For those living in California, please click here for additional information. EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities. **EY | Building a better working world** EY is building a better working world by creating new value for clients, people, society, and the planet, while building trust in capital markets. Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow. EY teams work across a full spectrum of services in assurance, consulting, tax, strategy, and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories. EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law. EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY's Talent Shared Services Team (TSS) or email the TSS at ************************** .
    $105.2k-186.4k yearly 60d+ ago
  • Cyber User Behavior Engineer

    Highmark Health 4.5company rating

    Cyber security analyst job in Sacramento, CA

    *****CANDIDATE MUST BE US Citizen (due to contractual/access requirements)***** **For candidates residing within a 50-mile radius of a Highmark office, a hybrid work schedule of three days per week (Tuesday, Wednesday, and Thursday) in the office is required.** The Cyber User Behavior Engineer is a pivotal role at Highmark, dedicated to enhancing our organization's security by cultivating a robust "security-first" culture. This individual will lead the design, implementation, and ongoing management of comprehensive security awareness programs. Their primary responsibility will be to educate, train, and inspire all Highmark employees to effectively identify and report security threats, ensuring adherence to Highmark's security policies and industry best practices. This role is crucial in minimizing human-centric security risks and fostering a vigilant and informed workforce. **ESSENTIAL RESPONSIBILITIES** + Develop, implement, and continuously improve a proactive program to identifying internal threats. + Establish close relationships with business stakeholders outside of the security discipline, working closely with privacy, physical security, fraud, legal, human resources and senior leadership. + Perform predictive analysis of behavior, anomalies, and concerns to identify internal threats. + Execute campaigns designed to improve enterprise security posture. + Continually enhance insider risk program to increase efficiencies and measure program effectiveness and report accordingly on progress. + Utilize change management methodologies to mitigate identified security risks. + Provide insider threat support to security operations and incident response teams in advance of and during cyber security incidents. + Ensure clear lines of communication including but not limited to; transparency to the business on upcoming security initiatives, identifying impact to the business and to consumers, helping shape remediation, and developing external and internal communications. + Ensure the education and awareness program is aligned with the Information Security Program, Policies and Standards. + Other duties as assigned or requested. **EDUCATION** **Required** + Bachelor's Degree in Business Education, Marketing or Information Systems **Substitutions** + Six (6) years relevant, progressive experience **Preferred** + Bachelors in Information Security **EXPERIENCE** **Required** + 3 years in IT or IT Security Focus + 3 years of Insider Threat Program focus To include: + 3 years with Human Intelligence (HUMINT) **OR** as an Open-source Intelligence Analyst **Preferred** + 1-3 years in a Security Awareness or adjacent role **LICENSES or CERTIFICATIONS** **Required** + None **Preferred** + Security + **OR** + GSEC **OR** + CISSP **OR** + CERT Insider Threat + SANS Security Awareness Professional (SSAP) Proofpoint Certified Security Awareness Specialist **SKILLS** + Change Management + Presentation Delivery + Prioritizing + Analytical and Logical Reasoning/Thinking + Communication Skills + Cyber Security + User Behavior + Continuous Improvement **Language (Other than English):** None **Travel Requirement:** 0% - 25% **PHYSICAL, MENTAL DEMANDS and WORKING CONDITIONS** **Position Type** Office-based Teaches / trains others regularly Frequently Travel regularly from the office to various work sites or from site-to-site Rarely Works primarily out-of-the office selling products/services (sales employees) Never Physical work site required Yes Lifting: up to 10 pounds Occasionally Lifting: 10 to 25 pounds Rarely Lifting: 25 to 50 pounds Never **_Disclaimer:_** _The job description has been designed to indicate the general nature and essential duties and responsibilities of work performed by employees within this job title. It may not contain a comprehensive inventory of all duties, responsibilities, and qualifications required of employees to do this job._ **_Compliance Requirement_** _: This job adheres to the ethical and legal standards and behavioral expectations as set forth in the code of business conduct and company policies._ _As a component of job responsibilities, employees may have access to covered information, cardholder data, or other confidential customer information that must be protected at all times. In connection with this, all employees must comply with both the Health Insurance Portability Accountability Act of 1996 (HIPAA) as described in the Notice of Privacy Practices and Privacy Policies and Procedures as well as all data security guidelines established within the Company's Handbook of Privacy Policies and Practices and Information Security Policy._ _Furthermore, it is every employee's responsibility to comply with the company's Code of Business Conduct. This includes but is not limited to adherence to applicable federal and state laws, rules, and regulations as well as company policies and training requirements._ Highmark Health and its affiliates prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on any category protected by applicable federal, state, or local law. We endeavor to make this site accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact the email below. For accommodation requests, please contact HR Services Online at ***************************** California Consumer Privacy Act Employees, Contractors, and Applicants Notice Req ID: J272819
    $90k-113k yearly est. 25d ago
  • Cyber Security Analyst

    General Dynamics 4.7company rating

    Cyber security analyst job in Beale Air Force Base, CA

    Full Part/Time: Full time Type of Requisition: Regular Clearance Level Must Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret/SCI Public Trust/Other Required: None Job Family: Cyber and IT Risk Management Job Qualifications: Skills: Cyber Defense, Cybersecurity, Network Defense Certifications: None Experience: 3 + years of related experience US Citizenship Required: Yes Job Description: Cyber Security Analyst Join our technology leading team of men and women that solve some of the world's most complex technical challenges. GDIT is seeking an enthusiastic Cyber Network Defense Analyst who is seeking to expand his/her experience in the IT field by joining our team in support of the Intelligence, Surveillance, and Reconnaissance (ISR) mission of the Airforce at Langley AFB, Va. Our Cyber Network Defense team supports the Air Forces' Distributed Common Ground System (DCGS) Processing, Exploitation, Dissemination (PED) Operations Center (DOC). Specifically, you will be providing Cyber Monitoring and Defense across a global enterprise. The Computer Network Defense Analyst will be responsible to: * Provide near-real-time monitoring and analysis of insider and external threats utilizing network security tools and custom developed scripts IAW Intelligence Community Directive (ICD) 502 * Perform near-real-time network security alerting and problem resolution * Prioritize remediation efforts using reliable threat intelligence * Monitor and protect the security of the DCGS from internal and external threats * Implement the Enterprise Audit Conceptual Framework as defined by Intelligence Community Standard (ICS) 500-27 * Perform all functions of the CND Framework * Generate a complete list of auditable events for all user activity and then process, format, filter, and share the data * Provide risk determination recommendations to the Authorizing Official (AO) regarding acceptance or rejection of an Authority to Operate (ATO) or Authority to Test (ATT) * Assess and report cyber readiness; perform an analysis of trends and concerns, and report key findings (i.e. provide recommendations and knowledge transfer based upon key findings) * Provide weekly update to Government program leads on current status of cyber readiness * Provide a robust set of checks and balances to protect against unauthorized network modifications, penetrations, and other threats that might affect mission operations * Manage antivirus definition files on DCGS Enterprise information systems * Provide guidance and assistance to other units and agencies responding to security events * Track and ensure enterprise compliance of Information Assurance Vulnerability Alerts (IAVA), DISA assist bulletins, and Air Force Computer Response Team (AFCERT) notifications and compliance with other governing directives * Perform and oversee network vulnerability scanning functions IAW governing directive Minimum Requirements: * Clearance: TS/SCI * Shift Work (4 on/3 off) * Minimum of three (3) years' of network and system security experience * Strong knowledge of ESS/HBSS * Demonstrated knowledge of the CND Framework 4.10.2.3 * Possess IAT Level II Security + (CE) certification * Possess Cyber Security Analysis (CySA) certification IAW DoD 8570 * Location: On Customer Site * US Citizenship Required GDIT IS YOUR PLACE: * 401K with company match * Comprehensive health and wellness packages * Internal mobility team dedicated to helping you own your career * Professional growth opportunities including paid education and certifications * Cutting-edge technology you can learn from * Rest and recharge with paid vacation and holidays #GDITPriority The likely salary range for this position is $72,509 - $86,250. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Scheduled Weekly Hours: 40 Travel Required: Less than 10% Telecommuting Options: Onsite Work Location: USA CA Beale AFB Additional Work Locations: Total Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most. We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology. Join our Talent Community to stay up to date on our career opportunities and events at gdit.com/tc. Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $72.5k-86.3k yearly 21d ago
  • Government Information Security Engineer

    Intel Corp 4.7company rating

    Cyber security analyst job in Folsom, CA

    Our Government Information Techology and Security (GITS) Team is looking for a talented and motivated individual with strong technical skills and the ability to rapidly learn new technologies. We are growing our Hybrid Cloud solution suite to meet US Government requirements for data safeguarding. Information Security Engineers within GITS are actively involved in the following: * Identifies, develops, plans, implements, and supports enterprise security systems using Agile methodologies and DevOps principles to improve and grow our secure solutions to enhance Intel Federal's capabilities with a constant focus on security. * Creates solutions in partnership with enterprise architecture to design security measures (from infrastructure to software) that safeguard sensitive data, protect confidentiality and availability, and enable compliance with security policies and regulatory requirements for the enterprise and USG regulations and standards. * Partners with system engineers, network engineers, database administrators, and information security personnel in support, integration, development, and lifecycle management. * Develops and validates functional requirements and identifies gaps or risks to meet business and security outcomes. * Reviews health measures for various functional performance components of platform, applications, controls, and appliances and supports key security systems, responds to security events, and troubleshoots and proactively discovers security issues across the enterprise. * Validates security controls are working as designed (validation and/or efficacy) to ensure effective security measures. * Develops new and/or updates existing controls that limit the risk exposure for the company and optimizes security system performance. * Researching new security and information technology trends in enterprise applications, networks, and systems to understand and drive strategic plans, forward engineering, upgrades, and changes while influencing vendors to drive bug resolution, product feature enhancement, and key security improvements. * Works to identify, design, test, document, and implement internal process improvements such as automating manual processes, optimization of data delivery, elimination of technical debt, and support/administration of key security control systems. * Supports lifecycle management of systems, software, and infrastructure. Behavioral Traits * Passion for Information Security. * Customer service and stakeholder management skills, including experience in setting and managing user and stakeholder expectations is a must in this role. We partner closely with the Intel Federal business teams to ensure we can prioritize and deliver key IT solutions to the business. * Strong interpersonal, analytical, problem solving, negotiating, influencing, facilitation, organizational, prioritization, decision making and conflict resolution skills. * Strong team player who works both independently and collaboratively with peers and teams. Qualifications: Minimum qualifications are required to be initially considered for this position. Preferred qualifications are in addition to the minimum requirements and are considered a plus factor in identifying top candidates. Requirements listed would be obtained through a combination of industry relevant job experience, internship experiences and / or schoolwork/classes/research. Minimum Qualifications * U.S. Citizenship. * Bachelor's degree in computer science, Information Security, or related Information Technology field with 3+ years of relevant experience. * 3+ years of experience in Information Security. * 1+ year of experience working in an environment that supports Controlled Unclassified Information (CUI) or International Traffic in Arms Regulations (ITAR) data. * 3+ years of experience with script writing for automation and integration (e.g. PowerShell, .Net, Python, etc.) * 1+ year of Identity Access Management experience. (e.g. Entra ID or other IAM tools) * 1+ year Azure or AWS Hosted Cloud environment experience. Preferred Qualifications: * Track record of excellent customer Service and Support skills - Independently troubleshoots for successful problem resolution. * MS Azure Government Cloud and Amazon Web Services GovCloud solutions deployment experience desired. * 1+ year of experience working with NIST Special Publication 800-171 and/or 800-53 compliance standards. * 1+ year of experience working with NIST 800- 171A readiness assessment procedures. * Willingness to quickly ramp up on online data solutions - quickly applying trusted technologies across on-premises, cloud, and hybrid cloud environments. * Experience using Privilege Access Management (PAM) or similar tools. * Windows and Linux OS and application operations support, administration, security configuration and monitoring. * Security certifications are an advantage (CISSP, CISM, CEH, CCNA, etc.) * Experience working with applications such as SCOM, BigFix, Azure Security Center and Antivirus configuration. * Experience with Datacenter management operations such as servers/hardware handling, installation, configuration, decom and general support. * Experience with Agile Scrum and/or Kanban project management methodologies. * Scaled Scrum, SAFe, or other scaled Agile framework approaches to manage operations, engineering and development workloads. Job Type: Experienced Hire Shift: Shift 1 (United States of America) Primary Location: US, Oregon, Hillsboro Additional Locations: US, Arizona, Phoenix, US, California, Folsom, US, Virginia, Fairfax Business group: Posting Statement: All qualified applicants will receive consideration for employment without regard to race, color, religion, religious creed, sex, national origin, ancestry, age, physical or mental disability, medical condition, genetic information, military and veteran status, marital status, pregnancy, gender, gender expression, gender identity, sexual orientation, or any other characteristic protected by local law, regulation, or ordinance. Position of Trust N/A Benefits: We offer a total compensation package that ranks among the best in the industry. It consists of competitive pay, stock, bonuses, as well as, benefit programs which include health, retirement, and vacation. Find more information about all of our Amazing Benefits here: ********************************************************************************** Annual Salary Range for jobs which could be performed in the US: 104,770.00 USD - 204,290.00 USD The range displayed on this job posting reflects the minimum and maximum target compensation for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific compensation range for your preferred location during the hiring process. Work Model for this Role This role will require an on-site presence. * Job posting details (such as work model, location or time type) are subject to change.
    $107k-141k yearly est. Auto-Apply 60d+ ago
  • Information Security Analyst I

    University of The Pacific 4.5company rating

    Cyber security analyst job in Stockton, CA

    Primary Purpose The Information Security Analyst I provides support for the operational and consultative functions of the University of the Pacific Information Security department in collaboration with the Pacific Technology division and stakeholders across the University. The Information Security Analyst I helps design, implement, manage, and monitor technical, administrative, and physical controls used to protect the confidentiality, integrity, and availability of the University's information assets. Essential Functions Configure/operate/audit various information security controls such as antivirus/antimalware, firewall, etc. to ensure control effectiveness and report/present results to management and technical staff. Analyze findings from security monitoring systems, such as Data Loss Prevention, Firewall, and Security Information Event Management consoles, to identify and respond to security incidents. Conduct vulnerability scans and penetration tests to identify security risks and report findings to system owners and advise on remediation as needed. Participate in security incident response by conducting forensic investigations, isolating malware, identifying attack vectors, and providing guidance on containment and remediation. Participate in organization's disaster recovery and business continuity planning, testing, and execution. Respond to service requests received from end users or other teams (e.g. for investigation of security events, reviewing change requests on systems impacting security, or addressing user access requests). Assist in delivering security awareness training for the organization's staff and students as needed. Maintain knowledge and advise staff and students on organization's policies, standards, and procedures relating to information security. Participate in campus-wide information security events and programs to ensure alignment and knowledge sharing between departments. 24×7 on-call support rotation may be required. Performs other related duties as assigned. University of the Pacific recognizes that diversity, equity, and inclusion is foundational to the success of our valued students and employees. We prioritize policy and decision-making that demonstrates awareness of, and responsiveness to, the ways socio-cultural forces related to race, gender, ability, sexuality, socio-economic status, etc. impede or propel students, faculty, and staff. Minimum Qualifications Associate's Degree in computer science, technology, or related field. Three (3) years of increasingly responsible experience in developing, designing, auditing, installing, delivering, operating, or maintaining information security systems in a higher education or enterprise environment. Preferred Qualifications Education/Experience/Certifications: Bachelor's Degree in computer science or related field. Entry level information security certification such as Security+, GSEC , or SSCP . Skills/Knowledge and Expertise: Ability to configure operating systems commonly used in servers, desktops, and mobile devices. Knowledge of networking equipment and practices used in an enterprise IT environment. Demonstrated troubleshooting and problem-solving skills. Ability to analyze data using spreadsheets, databases, scripts, etc. Ability to work in a team environment and take direction and guidance. Ability to research and learn outside of formal training. Time management, organizational skills and ability to complete tasks as assigned. Experience and sensitivity in working with people of diverse backgrounds and cultures. Demonstrated experience in advancing social justice, equity, and inclusion in a university setting. Ability to engage and integrate culturally responsive practices and knowledge in their work.
    $69k-96k yearly est. 5d ago
  • Security Engineer Investigator, Insider Trust

    Meta 4.8company rating

    Cyber security analyst job in Sacramento, CA

    As part of Meta Security, our Insider Trust team is dedicated to identifying and responding to insider threats that target our data. Our mission is to detect, investigate, and mitigate damage caused by insider threats. We handle a wide range of abuse cases, including misuse of user data, intellectual property theft, and leaks of sensitive information.We are seeking an experienced Security Engineer to join the team. This role involves investigating, hunting, and automating internal signals to detect malicious activities related to insider threats. **Required Skills:** Security Engineer Investigator, Insider Trust Responsibilities: 1. Perform analysis, and threat hunting from a variety of log sources (e.g., individual host logs, network traffic logs) to identify potential insider threats 2. Create workflows and automations to streamline signal detection, threat hunts, and investigative processes 3. Collaborate with software and production engineering teams to build scalable and adaptable solutions for insider threat investigations 4. Identify gaps in our infrastructure and work with cross-functional partners to improve visibility through logging and automation 5. Build operational workflows and actions to auto-resolve false positives and provide context, scaling investigation capabilities 6. Prioritize efforts to maximize impact by enhancing visibility, automating processes, and scaling investigative capabilities 7. Coach, mentor, and support team members to foster long-term career growth, job satisfaction, and success **Minimum Qualifications:** Minimum Qualifications: 8. Bachelor's degree in Computer Science, Engineering, or equivalent experience 9. 5+ years of experience in Detection & Response Engineering, Insider Threat, or a similar Security Engineering role 10. Technical and procedural expertise in conducting security investigations, including response, forensics, and large-scale log analysis 11. Experience with attacker tactics, techniques, and procedures 12. Proficiency in coding or scripting in one or more general-purpose programming languages **Public Compensation:** $147,000/year to $208,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $147k-208k yearly 60d+ ago
  • Principal Security Engineer

    Oracle 4.6company rating

    Cyber security analyst job in Sacramento, CA

    The Oracle Cloud Security and Safety team is seeking dedicated security engineers looking to make their mark in a new security domain. The team is committed to bridging the gap between operations and security, empowering the engineering and operations teams within Oracle to operate their services without fear of security impacting mistakes or malicious behavior. Oracle Cloud Infrastructure is committed to constantly improving and securing our suite of massive scale, integrated cloud services in a broadly distributed, multi-tenant cloud environment. We are committed to providing the best in cloud products that meet the needs of our customers who are tackling some of the world's biggest challenges. We offer unique opportunities for smart, hands-on security engineers with the expertise and passion to solve difficult architecture, engineering, and process problems. Our customers run their businesses on our cloud, and our mission is to provide them with the most secure cloud services. Our ideal candidate is a security engineer with expertise and passion in finding and improving areas of weakness, while developing new standards in the security and safe operation of distributed systems, multi-tenant services and large-scale infrastructures. If this is you, joining Oracle Cloud Infrastructure (OCI) will enable you to design and build innovative new security models & systems from the ground up. These are exciting times in our space - we are growing fast and working on ambitious new initiatives. A security-focused engineer at any level can make significant technical and business impact **Responsibilities** + Prototype, design, and implement security solutions for new and challenging problems + Drive and champion security tool development (e.g. scanning tools) + Consult software development teams in design and architecture of safe and secure systems through Threat Modeling and modeling exercises + Champion and consult on secure development lifecycle practices + Design and integrate verification and posture reporting mechanisms + Define security configuration and implementation best practices Qualifications: + Bachelor's or Master's degree in Computer Science or related field + 5+ years of experience in security engineering or related field or equivalent experience + Experience building automated security solutions + Strong security experience, particularly with focus in one of the following areas: + Defensive Security + Offensive Security + Service architecture and Design Patterns + Strong collaboration and communication skills Preferred Skills + Experience scaling operational activities via Python, Bash, and other tools + DevOps or SRE experience operating large, distributed, continuously deployed services + Experience operating large, distributed, continuously deployed services + Expertise in designing databases schemas in (NoSQL / SQL). + Knowledge on bridging security engineering requirements into the software development life cycle. + Security training and mentoring experience + Experience with statistical/mathematical predictive modeling + Experience with machine learning / artificial intelligence + Experience designing resilient systems that support quick recovery + Experience with container orchestration and management + History of collaborating and integrating processes with software development teams, data scientists, business and other technical roles + Experience with Java or Python development Disclaimer: **Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.** **Range and benefit information provided in this posting are specific to the stated locations only** US: Hiring Range in USD from: $109,200 to $223,400 per annum. May be eligible for bonus and equity. Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle's differing products, industries and lines of business. Candidates are typically placed into the range based on the preceding factors as well as internal peer equity. Oracle US offers a comprehensive benefits package which includes the following: 1. Medical, dental, and vision insurance, including expert medical opinion 2. Short term disability and long term disability 3. Life insurance and AD&D 4. Supplemental life insurance (Employee/Spouse/Child) 5. Health care and dependent care Flexible Spending Accounts 6. Pre-tax commuter and parking benefits 7. 401(k) Savings and Investment Plan with company match 8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation. 9. 11 paid holidays 10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours. 11. Paid parental leave 12. Adoption assistance 13. Employee Stock Purchase Plan 14. Financial planning and group legal 15. Voluntary benefits including auto, homeowner and pet insurance The role will generally accept applications for at least three calendar days from the posting date or as long as the job remains posted. Career Level - IC4 **About Us** As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all. Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs. We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_************* or by calling *************** in the United States. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
    $109.2k-223.4k yearly 60d+ ago
  • Senior Analyst, Security Compliance (SOX IT)

    Coinbase 4.2company rating

    Cyber security analyst job in Sacramento, CA

    Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system. To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems. Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be. While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported. Coinbase stores more digital currency than any company in the world, making us a top tier target on the internet. Security is core to our mission and has been a key competitive differentiator for us as we scale worldwide. Essential to scaling is building and running a security compliance program that reflects how we protect the data and assets in our care, to open the doors with customers, regulators, auditors, and other external stakeholders. If you love working with fast moving companies to grow and scale security compliance engines and create positive change across the business, we'd like to speak with you about joining our team. Coinbase is looking for a Security Compliance Senior Analyst to drive the second line of defense IT SOX initiatives and help mature the IT SOX program. *What you'll be doing (ie. job duties):* * Lead Security and IT initiatives to support the SOX roadmap and advance program maturity * Assist with SOX planning activities, including scoping of IT systems and creating training material to owners in preparation for SOX audit * Lead security control gap assessments over SOX control environment, recommend remediation plans and track through completion * Assess SOX implications of new products, update relevant controls, and communicate requirements to product organization and other stakeholders * Provide ongoing reporting to stakeholders and leadership on above responsibilities and communicate progress and escalations management * Perform SOX audit and control impact analysis as a result of security and technology incidents and partner with owning teams on control uplift activities * Build close relationships with stakeholder teams including Security, IT, Infrastructure, Engineering, Data, and Finance to advise on SOX requirements and ensure excellence in control ownership * Create and improve SOX procedural documentation, including process documentation, data flow diagrams, and uplifting templates * Work closely with internal and external auditors to educate them about a complex technology control environment * Oversee quality of audit initiatives, identify and analyze process gaps, provide guidance and expertise to team members * Develop creative solutions to prove risk mitigation and solve for complex audit problems faced by the crypto industry * Identify opportunities to address systemic program challenges, recommend solutions and drive efficiency through AI and automation *What we look for in you (ie. job requirements):* * Minimum of 5+ years of security/IT compliance or equivalent experience * Strong knowledge and hands-on experience in Internal Controls over Financial Reporting, SOX 404 frameworks, and testing to support compliance * Prior experience at a big 4 accounting firm * Experience leading compliance initiatives from start to finish * Proven understanding and audit experience of cloud technologies, AWS preferred * Ability to effectively and autonomously accomplish outcomes across cross-functional teams in ambiguous situations with minimal supervision * Strong oral and written communication skills * Ability to multitask, direct cross functional work, and hold others accountable to committed deadlines in a fast paced environment * Ability to communicate with technical / non-technical stakeholders to align on shared outcomes * Experience in Financial services, Big Tech, or FinTech *Nice to haves:* * BA or BS in a technical field or equivalent experience * Security certifications e.g. CISA, CISSP, CISM or other relevant certifications * Experience auditing in Crypto space Position ID: P73675 \#LI-Remote *Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)). Pay Range: $167,280-$196,800 USD Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying. Commitment to Equal Opportunity Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law. Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations*********************************** *Global Data Privacy Notice for Job Candidates and Applicants* Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required. *AI Disclosure* For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description. For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate. *The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
    $167.3k-196.8k yearly 56d ago
  • Cyber Security Analyst

    GD Information Technology

    Cyber security analyst job in Beale Air Force Base, CA

    Type of Requisition: Regular Clearance Level Must Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret/SCI Public Trust/Other Required: None Job Family: Cyber and IT Risk Management Job Qualifications: Skills: Cyber Defense, Cybersecurity, Network Defense Certifications: CySA+: CompTIA Cybersecurity Analyst - CompTIA - CompTIA, Security Plus - CompTIA - CompTIA Experience: 3 + years of related experience US Citizenship Required: Yes Job Description: Cyber Security Analyst Join our technology leading team of men and women that solve some of the world's most complex technical challenges. GDIT is seeking an enthusiastic Cyber Network Defense Analyst who is seeking to expand his/her experience in the IT field by joining our team in support of the Intelligence, Surveillance, and Reconnaissance (ISR) mission of the Airforce. Our Cyber Network Defense team supports the Air Forces' Distributed Common Ground System (DCGS) Processing, Exploitation, Dissemination (PED) Operations Center (DOC). Specifically, you will be providing Cyber Monitoring and Defense across a global enterprise. The Computer Network Defense Analyst will be responsible to: Provide near-real-time monitoring and analysis of insider and external threats utilizing network security tools and custom developed scripts IAW Intelligence Community Directive (ICD) 502 Perform near-real-time network security alerting and problem resolution Prioritize remediation efforts using reliable threat intelligence Monitor and protect the security of the DCGS from internal and external threats Implement the Enterprise Audit Conceptual Framework as defined by Intelligence Community Standard (ICS) 500-27 Perform all functions of the CND Framework Generate a complete list of auditable events for all user activity and then process, format, filter, and share the data Provide risk determination recommendations to the Authorizing Official (AO) regarding acceptance or rejection of an Authority to Operate (ATO) or Authority to Test (ATT) Assess and report cyber readiness; perform an analysis of trends and concerns, and report key findings (i.e. provide recommendations and knowledge transfer based upon key findings) Provide weekly update to Government program leads on current status of cyber readiness Provide a robust set of checks and balances to protect against unauthorized network modifications, penetrations, and other threats that might affect mission operations Manage antivirus definition files on DCGS Enterprise information systems Provide guidance and assistance to other units and agencies responding to security events Track and ensure enterprise compliance of Information Assurance Vulnerability Alerts (IAVA), DISA assist bulletins, and Air Force Computer Response Team (AFCERT) notifications and compliance with other governing directives Perform and oversee network vulnerability scanning functions IAW governing directive Minimum Requirements: Clearance: TS/SCI Shift Work (4 on/3 off) Minimum of three (3) years' of network and system security experience Strong knowledge of ESS/HBSS Demonstrated knowledge of the CND Framework 4.10.2.3 Possess IAT Level II Security + (CE) certification Cyber Security Analysis (CySA) certification preferred Location: On Customer Site US Citizenship Required GDIT IS YOUR PLACE: 401K with company match Comprehensive health and wellness packages Internal mobility team dedicated to helping you own your career Professional growth opportunities including paid education and certifications Cutting-edge technology you can learn from Rest and recharge with paid vacation and holidays #GDITPriority The likely salary range for this position is $63,750 - $86,250. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Scheduled Weekly Hours: 40 Travel Required: Less than 10% Telecommuting Options: Onsite Work Location: USA CA Beale AFB Additional Work Locations: Total Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at gdit.com/tc. Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $63.8k-86.3k yearly Auto-Apply 21d ago
  • Information System Security Officer (ISSO)

    Leidos 4.7company rating

    Cyber security analyst job in Marysville, CA

    Are you ready for a rewarding career opportunity? Unleash your potential at Leidos, where we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customer's success. We empower our teams, contribute to our communities, and operate sustainably. Everything we do is built on a commitment to do the right thing for our customers, our people, and our community. Our Mission, Vision, and Values guide the way we do business. If this sounds like an environment where you can thrive, keep reading! Are you looking for a career that will help you grow and thrive? Look no further than Leidos! Our training, teamwork, and challenging technical work will help you accelerate your career path like never before. We're seeking talented ISSOs for future openings to join our team at Beale AFB, CA. Let's see what we can achieve together - apply today! Job Summary: Applicants will support the Air Force Distributed Common Ground System (AF DCGS) by providing TS/SCI Special Access Program (SAP) Information System Security Officer (ISSO) support to the 548 ISR GP located at Beale AFB CA. Primary Responsibilities: Applicants will be responsible for the day-to-day security accreditation and certification of TS/SCI SAP-specific systems. Applicants will monitor SAP systems and operating environments to include developing and updating security plans, managing, and controlling changes, and assessing the security impact of those changes in compliance with operational and security directives. Applicants will oversee SAP account authorization, creation, and management. They will ensure all users have the requisite security clearances, authorization, need-to-know. They will develop and implement security education, training, and awareness programs and ensure all personnel are provided security awareness training before granting SAP access. Applicants will notify the Information System Security Manager (ISSM) of any changes or modifications to hardware, software, or firmware that might adversely impact system accreditation and ensure proper measures are taken when an incident or vulnerability is discovered in compliance with governing directives. They will provide inputs to DCGS System Security Authorization Agreement (SSAA), prepare all on-site information assurance documentation, populate the XACTA database with system accreditation actions/data, create Plans-of-Action and Milestones (POA&M) and recommend / implement Security Assessment Reports (SAR) corrective actions. The applicant will develop, collaborate and coordinate IA solutions with product developers and AF acquisition agents, security, Information Technology and operations personnel during day-to-day operations and during a variety of weekly / monthly forums. Applicants must be capable of working independently and collaboratively with AF DCGS stakeholders and possess excellent oral and written communication skills. Basic Qualifications: Possess a Bachelor's of Science degree in a related filed and 6 years of relevant experience or an Associate's Degree and 10 years of relevant operational experience. Minimum of 4 years of ISSO experience is required. Must possess a current TS/SCI clearance eligibility on date of employment. Must possess knowledge and experience using NISTSP 800-53 Rev 4 and CNSSI 1253 Must possess current DOD 8140 IAT Level II certifications on date of employment. Preferred Qualifications: Previous SAP access IAM II certification Extensive working knowledge of Risk Management Framework (RMF), Assessment and Authorizations (A&A), Xacta IA Manager workflow platforms is highly desired. Original Posting:May 23, 2025 For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above. Pay Range:Pay Range $67,600.00 - $122,200.00 The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
    $67.6k-122.2k yearly Auto-Apply 60d+ ago
  • Security Engineer

    Integrated Resources 4.5company rating

    Cyber security analyst job in Sacramento, CA

    Integrated Resources, Inc., is led by a seasoned team with combined decades in the industry. We deliver strategic workforce solutions that help you manage your talent and business more efficiently and effectively. Since launching in 1996, IRI has attracted, assembled and retained key employees who are experts in their fields. This has helped us expand into new sectors and steadily grow. We've stayed true to our focus of finding qualified and experienced professionals in our specialty areas. Our partner-employers know that they can rely on us to find the right match between their needs and the abilities of our top-tier candidates. By continually exceeding their expectations, we have built successful ongoing partnerships that help us stay true to our commitments of performance and integrity. Our team works hard to deliver a tailored approach for each and every client, critical in matching the right employers with the right candidates. We forge partnerships that are meant for the long term and align skills and cultures. At IRI, we know that our success is directly tied to our clients' success. Job Description Hi, Hope you are doing well, I am sending you below job open with one of my direct client, Send me your most updated copy of your resume in word document ASAP Position: Security Engineer Location: Sacramento CA Duration 1 Year + Start Date : 15th April 2016 Basic Qualifications (minimum 2 years' experience) • Modern security, monitoring, and logging practices for system administration • Modern continuous monitoring tools • Experience with OAuth 2.0, Identity Management systems, and API authorization methods • Experience with code quality tools, especially pertaining to code security vulnerabilities • Experience with network level and application level security threats (i.e., SQL injection, DDOS, man in the middle attacks, etc.) Nice to Have Skills (minimum 2 years' experience): • Experience working with NIST 800-53 controls • Experience working with IBM Main Frame permissions (i.e. RACF) Additional Information Thanks nagesh 732-429-1641
    $124k-169k yearly est. 5h ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Sacramento, CA

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills. **Responsibilities:** + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Experience with scripting languages (e.g., PowerShell, Python) for automation and integration. + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Understanding of DevOps practices. + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. + Adaptability to stay ahead of evolving IAM technologies and security threats. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 26d ago
  • OT/ICS Security Engineer

    Pacific Coast Producers, Inc. 4.3company rating

    Cyber security analyst job in Woodland, CA

    Pacific Coast Producers | Full-Time | On-Site | Exempt Salary Range: $110,000-$140,000/year (based on experience) Pacific Coast Producers (PCP) , a growing agricultural cooperative with food production facilities across the West Coast, is seeking a talented and innovative OT/ICS Security Engineer to join our team in Woodland, CA . PCP is dedicated to investing in its people and fostering a culture of service, where each employee can do their best to make affordable, high-quality food for customers across North America. We are seeking a highly skilled OT/ICS Security Engineer enhance the security posture of our Operational Technology (OT) and Industrial Control Systems (ICS) environments. This role is critical in ensuring the integrity, availability, and confidentiality of industrial networks, protecting critical infrastructure, and implementing robust cybersecurity strategies tailored to the unique needs of our industrial environments. Primary Duties & Responsibilities: This is a hands-on role that involves administering and implementing solutions, planning strategically, and resolving issues as they arise-all while maintaining sensitivity to plant and distribution center operations. Implement and Support OT/ICS security strategies that align with business goals and meet industry standards and regulatory requirements. Conduct risk assessments, manage vulnerabilities, and conduct security audits across operational technology systems. Collaborate with engineering, IT, and operations teams to integrate cybersecurity best practices into servers, PCs, SCADA, DCS, PLCs, and other industrial control systems. Monitor for cybersecurity threats, incidents, and anomalies impacting industrial assets, and coordinate appropriate response actions. Maintain OT security policies, procedures, and training programs to build awareness and strengthen security practices. Work closely with the CIO/CISO, VP of Operations, and Director of Engineering-teamwork and collaboration are critical to success in this role. Review existing architectures, identify security gaps, and recommend prioritized improvements with a risk-aware approach. Partner with external vendors and consultants to evaluate and implement new security technologies and solutions. Ensure security initiatives align with frameworks such as NIST CSF, ISA/IEC 62443, CIS Controls, and MITRE ATT&CK for ICS. Participate in incident response efforts for OT-related breaches, including forensic investigations and corrective action planning. Collaborate cross-functionally to audit and test networks, servers, and OT/ICS equipment to ensure system integrity and security Qualified candidates must have the following experience, education and skills: Bachelor's degree in Cybersecurity, Computer Science, Industrial Engineering, or a related field. 2+ years of cybersecurity experience, with at least 1 year specifically focused on OT/ICS environments. Strong networking background. Knowledge of SCADA, PLCs, DCS, HMIs, IIoT, and industrial network protocols such as Modbus, DNP3, OPC-UA, and BACnet. Some Hands-on experience with firewalls, IDS/IPS, network segmentation, and endpoint protection in OT environments. Strong analytical skills in threat detection, vulnerability management, and incident response. Excellent communication skills, with the ability to collaborate effectively with both technical and non-technical teams. Preferred Qualifications: Familiarity with risk management methodologies and compliance standards such as NERC CIP, ISO 27001, GDPR, and CISA guidelines . While not required, the following certifications are considered a plus: CISSP, GICSP, GRID, CISM, ISA/IEC 62443 Expert . The ability to strategize, document, and implement business continuity and disaster recovery. Salary Range $110,000-$140,000 per year; candidate will be paid based on their work experience and skills. This is a full-time , on-site role based at our Production Facility in Woodland, CA. Occasional travel to our other locations in California and Oregon will be required; frequency may vary based on business needs. The base salary range reflects the reasonable expectation for what the company anticipates paying for this role at the time of posting. The actual salary offered will depend on factors including, but not limited to: Relevant skills, education, and experience Job-related qualifications and certifications Internal pay equity Market conditions and business needs Why Join PCP? At PCP, we take care of our people. Here are just a few of the benefits full-time employees enjoy: Competitive pay with opportunities for advancement. This position is eligible for our annual profit-sharing bonus program. Medical, dental, and vision coverage for you and your family, starting the first of the month after you join us. Retirement plans to support your long-term security. Paid time off including vacation, holidays, parental leave, sick leave, and bereavement. Life and disability insurance plus an Employee Assistance Program. Development opportunities through online courses, classroom training, and on-the-job growth. The stability of a farmer-owned cooperative with more than 50 years of success. A mission-driven culture focused on feeding families across North America . If you are enthusiastic about securing industrial environments and ready to take on a leadership role in OT/ICS cybersecurity , we encourage you to apply and be part of our mission in safeguarding critical infrastructure. Sponsorship : This role is not eligible for current or future visa sponsorship. About PCP Summary Pacific Coast Producers, a cooperative owned by more than 165 family farmers who cultivate and transport diverse produce like tomatoes, peaches, pears, grapes, cherries, and others, was founded in 1971. The company operates processing and packaging facilities in California and Oregon and has a workforce of over 3,000 employees. PCP is committed to delivering top-quality products to customers in all channels of trade, such as foodservice distributors and grocery retailers throughout the United States and Canada. Our facility is located in Woodland, CA, a charming city in Yolo County, known for its rich agricultural history and small-town charm. With a historic downtown area, a thriving arts scene, and close proximity to Sacramento, Woodland offers a unique blend of rural and urban living. Additionally, the city has a strong economy and a growing business community, making it an ideal place to work and grow your career. AA/EEO Policy Statement Pacific Coast Producers is an affirmative action and equal opportunity employer. No employee or applicant will be discriminated against in any condition of employment because of race, color, national origin, sex, religion, age, disability, veteran status, or any other status protected by law.
    $110k-140k yearly Auto-Apply 6d ago
  • Senior Security Engineer

    Goodleap 4.6company rating

    Cyber security analyst job in Roseville, CA

    About GoodLeap:GoodLeap is a technology company delivering best-in-class financing and software products for sustainable solutions, from solar panels and batteries to energy-efficient HVAC, heat pumps, roofing, windows, and more. Over 1 million homeowners have benefited from our simple, fast, and frictionless technology that makes the adoption of these products more affordable, accessible, and easier to understand. Thousands of professionals deploying home efficiency and solar solutions rely on GoodLeap's proprietary, AI-powered applications and developer tools to drive more transparent customer communication, deeper business intelligence, and streamlined payment and operations. Our platform has led to more than $30 billion in financing for sustainable solutions since 2018. GoodLeap is also proud to support our award-winning nonprofit, GivePower, which is building and deploying life-saving water and clean electricity systems, changing the lives of more than 1.6 million people across Africa, Asia, and South America. Position Summary The GoodLeap security team is responsible for both business enablement and safeguarding the organization's information assets; it is involved in virtually all aspects of the business, from product safety and resilience, to building security paved roads, customer, partner, and regulatory trust, managing technology governance and compliance, and ensuring the privacy, and safety of GoodLeap's customers, partners, and employees information. The senior security engineer role provides a unique opportunity to shape the security and resilience of GoodLeap corporate systems, services, and operational processes. In this role, you will work closely with product, engineering, IT, and business teams within GoodLeap, acting as the key individual with both the authority and responsibility to ensure the safety and resilience of enterprise systems, products, and services. Your oversight will encompass: - Enterprise systems:Identifying potential misuse and abuse cases, proposing solutions to address these scenarios, and identifying product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. - Build-time controls: Managing applications/products security controls and activities during development. - Runtime controls: Overseeing security measures at runtime, from prevention to detection and response. Additionally, you will be involved with aspects of internally built products and represent all areas of security, spanning governance, risk, and compliance (GRC) to security monitoring, for a number of departments/teams. You will also have the authority and ability to involve other security team members as needed. While you will take on multiple responsibilities-from advisor to builder and beyond-your primary focus will be designing and building security patterns and practices for services and processes, and fostering strong relationships with product, business, and engineering. Essential Job Duties & Responsibilities Lead, participate in, and contribute to partnerships between security, IT, General & Administrative teams, engineering, product, and operations teams to build, orchestrate, and automate security controls and services in GoodLeap enterprise systems, products, services, and operational processes. Identify potential misuse and abuse cases in enterprise systems, propose solutions to address these scenarios, and identify product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. Support or develop components of the security analytics platform. Contribute to investigations, threat hunting, and incident response activities in a supporting role. Collaborate with the monitoring and response team to create playbooks for specific incident response scenarios related to the products and services you oversee. These investigations, incidents, and playbooks may address security, fraud, privacy, resilience, and related concerns. Support the security operations team with the vulnerability management lifecycle for products and services under your purview. Ensure technical alignment for the products and services you oversee with team initiatives, including GRC, security operations, and monitoring and response activities. Required Skills, Knowledge & Abilities Strong communicator with the ability to lead technical architecture discussions, drive technical decisions, and effectively communicate with non-technical audiences. Expertise in agile product lifecycles. Ideally, you have experience in a product manager or engineering manager role and understand how SaaS products (B2B, B2B2C, and B2C) are built, including roadmap planning and feature and defect prioritization. Experience with threat modeling methodologies, with the ability to create efficient and scalable approaches to conducting such assessments. Familiarity with AWS services, including KMS, SST, Container Registry, ELBs, Lambda, API Gateway, CloudTrail, and IAM (knowledge of GCP and/or Azure is a plus). Proven ability to establish credibility and build trust with business, engineers, and operational staff; confident yet humble. Hands-on experience with managing security for core enterprise systems, e.g., ERP, HCM, Salesforce, etc. Strong understanding of both human and non-human identity management and common enterprise and consumer authentication standards and use cases. Practical experience with CI/CD pipelines and DevOps tools, including Infrastructure-as-Code (IaC) tools like Terraform, Pulumi, or CDK; GitHub and GitHub Actions; artifact management; and secrets management tools like Doppler and HashiCorp Vault. Passionate about learning new technologies. While you're not expected to know everything, you should demonstrate a willingness and ability to learn as needed. Prior experience interfacing and supporting with G&A teams, internal product teams, and other cross-functional areas. Proficiency in writing automation scripts in multiple languages, with prior experience automating security processes in cloud or SaaS environments. Experience engaging with vendors in design partnerships. Experience overseeing vulnerability and threat management at the platform and application levels. Familiarity with penetration testing and red team exercises, including manual verification, exploitation, and lateral movement. Ability to balance a high-level view of security strategy with attention to detail, ensuring thorough and effective execution. In addition to the above salary, this role may be eligible for a bonus. Additional Information Regarding Job Duties and s: Job duties include additional responsibilities as assigned by one's supervisor or other managers related to the position/department. This job description is meant to describe the general nature and level of work being performed; it is not intended to be construed as an exhaustive list of all responsibilities, duties and other skills required for the position. The Company reserves the right at any time with or without notice to alter or change job responsibilities, reassign or transfer job position or assign additional job responsibilities, subject to applicable law. The Company shall provide reasonable accommodations of known disabilities to enable a qualified applicant or employee to apply for employment, perform the essential functions of the job, or enjoy the benefits and privileges of employment as required by the law. If you are an extraordinary professional who thrives in a collaborative work culture and values a rewarding career, then we want to work with you! Apply today! We are committed to protecting your privacy. To learn more about how we collect, use, and safeguard your personal information during the application process, please review our Employment Privacy Policy and Recruiting Policy on AI. We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $122k-156k yearly est. 1d ago
  • Security Engineer II

    Trustmark 4.6company rating

    Cyber security analyst job in Sacramento, CA

    Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities. We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information. You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs. **Responsibilities:** + Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data. + Conduct vulnerability assessments and penetration testing to identify and mitigate risks. + Develop and implement security policies, standards, and procedures. + Monitor security systems and respond to incidents promptly and effectively. + Stay up-to-date with the latest cybersecurity threats and trends. + Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business. + Provide technical guidance and support to internal stakeholders. **Qualifications:** + Bachelor's degree in Computer Science, Information Technology, or a related field or + 3-5 Years of network engineering or cyber engineering experience + Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001). + Proficiency in network security, systems security, application security, and data security. + Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM). + Excellent problem-solving and analytical skills. + Strong communication and interpersonal skills. + Ability to work independently and as part of a team. **Preferred Qualifications:** + Certifications such as CISSP, CISA, or CEH. + Experience with cloud security (e.g., AWS, Azure, GCP). + Knowledge of scripting and programming languages (e.g., Python, PowerShell). Brand: Trustmark Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums. **For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability. Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match. When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives. At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
    $103k-137k yearly est. 60d+ ago
  • Cyber Security Analyst

    General Dynamics Information Technology 4.7company rating

    Cyber security analyst job in Beale Air Force Base, CA

    **Req ID:** RQ210785 **Type of Requisition:** Regular **Clearance Level Must Be Able to Obtain:** Top Secret/SCI **Public Trust/Other Required:** None **Job Family:** Cyber and IT Risk Management **Skills:** Cyber Defense,Cybersecurity,Network Defense **Certifications:** CySA+: CompTIA Cybersecurity Analyst - CompTIA - CompTIA, Security Plus - CompTIA - CompTIA **Experience:** 3 + years of related experience **US Citizenship Required:** Yes **Job Description:** Cyber Security Analyst Join our technology leading team of men and women that solve some of the world's most complex technical challenges. GDIT is seeking an enthusiastic Cyber Network Defense Analyst who is seeking to expand his/her experience in the IT field by joining our team in support of the Intelligence, Surveillance, and Reconnaissance (ISR) mission of the Airforce. Our Cyber Network Defense team supports the Air Forces' Distributed Common Ground System (DCGS) Processing, Exploitation, Dissemination (PED) Operations Center (DOC). Specifically, you will be providing Cyber Monitoring and Defense across a global enterprise. **The Computer Network Defense Analyst will be responsible to:** + Provide near-real-time monitoring and analysis of insider and external threats utilizing network security tools and custom developed scripts IAW Intelligence Community Directive (ICD) 502 + Perform near-real-time network security alerting and problem resolution + Prioritize remediation efforts using reliable threat intelligence + Monitor and protect the security of the DCGS from internal and external threats + Implement the Enterprise Audit Conceptual Framework as defined by Intelligence Community Standard (ICS) 500-27 + Perform all functions of the CND Framework + Generate a complete list of auditable events for all user activity and then process, format, filter, and share the data + Provide risk determination recommendations to the Authorizing Official (AO) regarding acceptance or rejection of an Authority to Operate (ATO) or Authority to Test (ATT) + Assess and report cyber readiness; perform an analysis of trends and concerns, and report key findings (i.e. provide recommendations and knowledge transfer based upon key findings) + Provide weekly update to Government program leads on current status of cyber readiness + Provide a robust set of checks and balances to protect against unauthorized network modifications, penetrations, and other threats that might affect mission operations + Manage antivirus definition files on DCGS Enterprise information systems + Provide guidance and assistance to other units and agencies responding to security events + Track and ensure enterprise compliance of Information Assurance Vulnerability Alerts (IAVA), DISA assist bulletins, and Air Force Computer Response Team (AFCERT) notifications and compliance with other governing directives + Perform and oversee network vulnerability scanning functions IAW governing directive **Minimum Requirements:** + Clearance: TS/SCI + Shift Work (4 on/3 off) + Minimum of three (3) years' of network and system security experience + Strong knowledge of ESS/HBSS + Demonstrated knowledge of the CND Framework 4.10.2.3 + Possess IAT Level II Security + (CE) certification + Cyber Security Analysis (CySA) certification preferred + Location: On Customer Site + US Citizenship Required **GDIT IS YOUR PLACE:** + 401K with company match + Comprehensive health and wellness packages + Internal mobility team dedicated to helping you own your career + Professional growth opportunities including paid education and certifications + Cutting-edge technology you can learn from + Rest and recharge with paid vacation and holidays \#GDITPriority The likely salary range for this position is $63,750 - $86,250. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most. We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology. Join our Talent Community to stay up to date on our career opportunities and events at ******************** Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $63.8k-86.3k yearly 22d ago
  • Security Engineer

    Meta 4.8company rating

    Cyber security analyst job in Sacramento, CA

    Meta Platforms, Inc. (Meta), formerly known as Facebook Inc., builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps and services like Messenger, Instagram, and WhatsApp further empowered billions around the world. Now, Meta is moving beyond 2D screens toward immersive experiences like augmented and virtual reality to help build the next evolution in social technology. To apply, click "Apply to Job" online on this web page. **Required Skills:** Security Engineer Responsibilities: 1. Build tools that enable connectivity to our infrastructure only from Meta owned and managed devices. 2. Build machine attestation and secure certificate storage solutions to enable strong client trust. 3. Deploy systems that help mitigate security risks by understanding and controlling what software is allowed to execute on our client devices. 4. Develop, validate, and enforce our client security policies. 5. Build and deploy tools and automation that proactively detect and respond to security risks and threats to internal corporate services. 6. Advise and collaborate with other teams. 7. Telecommuting from anywhere in the U.S. allowed. **Minimum Qualifications:** Minimum Qualifications: 8. Requires Bachelor's Degree (or foreign equivalent) in Computer Science, Engineering or a related field and 1 year of experience in the job offered or a computer-related occupation 9. Requires 12 months of experience involving the following: 10. PHP, Golang, Python, C/C++, Rush, or Ruby 11. Designing and deploying security infrastructure such as PKI, key management, and certificate management 12. Endpoint Security & Management 13. Certificate Lifecycle 14. Devices & OS hardening and security policies 15. Identity & Access Management (Authentication & Authorization, SSO) 16. Network Security and 17. Programming and Code Review **Public Compensation:** $178,041/year to $200,200/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $178k-200.2k yearly 32d ago
  • Security Engineer - Nashville or Austin Location

    Oracle 4.6company rating

    Cyber security analyst job in Sacramento, CA

    Responsible for the planning, design and build of security architectures; oversees the implementation of network and computer security and ensures compliance with corporate security policies and procedures. **Responsibilities** Responsible for advanced planning, design and build of security systems, applications, environments and architectures; oversees the implementation of security systems, applications, environments and architectures and ensures compliance with information security standards and corporate security policies and procedures. Provides technical advice and direction to support the design and development of secure architectures. May participate in an incident management team, bringing advanced-level skills to respond to security events in line with Oracle incident response playbooks. Investigates purported intrusions and breaches, and oversees root cause analysis. Coordinates incidents with other business units and may act as Incident Commander of serious incidents. Develops new methods, and playbooks, as well as sophisticated scripts, applications, and tools, and trains others in their use. May participate in an incident management team, responding to security events in line with Oracle incident response playbooks. Investigates purported intrusions and breaches, and oversees root cause analysis. Coordinates incidents with other business units and may act as incident commander of serious incidents. Participates in developing new methods, playbooks throughout Oracle. Evaluates existing and proposed technical architectures for security risk, provides technical advice to support the design and development of secure architectures and recommends security controls to mitigate those risks. Evaluations of internal security architecture may include design assessment, risk assessment, and threat modeling. Brings advanced-level skills to research, evaluate, track, and manage information security threats and vulnerabilities in situations where in-depth analysis of ambiguous information is required, and where computer programming/scripting knowledge is required. Work with Senior management to develop and implement a multi-year security roadmap Focus on operational and strategic level tasks, and provide counsel and guidance to the junior level security operations engineers in the department. Disclaimer: **Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.** **Range and benefit information provided in this posting are specific to the stated locations only** US: Hiring Range in USD from: $109,200 to $223,400 per annum. May be eligible for bonus and equity. Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle's differing products, industries and lines of business. Candidates are typically placed into the range based on the preceding factors as well as internal peer equity. Oracle US offers a comprehensive benefits package which includes the following: 1. Medical, dental, and vision insurance, including expert medical opinion 2. Short term disability and long term disability 3. Life insurance and AD&D 4. Supplemental life insurance (Employee/Spouse/Child) 5. Health care and dependent care Flexible Spending Accounts 6. Pre-tax commuter and parking benefits 7. 401(k) Savings and Investment Plan with company match 8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation. 9. 11 paid holidays 10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours. 11. Paid parental leave 12. Adoption assistance 13. Employee Stock Purchase Plan 14. Financial planning and group legal 15. Voluntary benefits including auto, homeowner and pet insurance The role will generally accept applications for at least three calendar days from the posting date or as long as the job remains posted. Career Level - IC4 **About Us** As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all. Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs. We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_************* or by calling *************** in the United States. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
    $109.2k-223.4k yearly 60d+ ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Sacramento, CA

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding. **Responsibilities:** + **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture. + **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders. + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 26d ago
  • Offensive Security Engineer, Assessments (Web3)

    Coinbase 4.2company rating

    Cyber security analyst job in Sacramento, CA

    Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system. To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems. Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be. While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported. The Application Security organization at Coinbase is seeking to hire an experienced Offensive Security Engineer specializing in Web3 penetration testing and Web3 bug bounty program management and optimization. In this role, you will collaborate with the Bug Bounty Program Lead to drive Web3 bug bounty triage, validation, and strategic initiatives aimed at increasing program efficiency, maturity, and hacker engagement. You will work closely with whitehat hackers, security engineers, and cross-functional teams to enhance Coinbase's security posture through an effective bug bounty program. Additionally, you will perform penetration tests on Web3 technologies and applications, ensuring the security of Coinbase's blockchain-based products and services. *What you'll be doing (ie. job duties):* * Conduct security assessments of Web3 products and services, including smart contracts, DeFi protocols, and blockchain infrastructure. * Collaborate with partner teams to enhance detection and response capabilities for Web3 vulnerabilities. * Stay informed on emerging security trends, advisories, and academic research in the Web3 space. * Lead Web3 bug bounty triage and validation, ensuring timely and accurate assessments of reported vulnerabilities. * Develop and implement strategies to incentivize high-quality bug bounty submissions and engage with the hacker community. * Manage the Web3 bug bounty program, including scope updates, researcher communication, and payout disbursements. * Analyze bug bounty data to identify trends, common vulnerabilities, and areas for improvement. * Collaborate with engineering teams to prioritize and remediate vulnerabilities identified through the bug bounty program. * Mentor and train junior security engineers in Web3 bug bounty triage and analysis. * Provide on-call support for critical Web3 bug bounty-related incidents. * Document and report on Web3 bug bounty metrics and program effectiveness. *What we look for in you (ie. job requirements):* * Bachelor's or Master's degree in Computer Science, Cybersecurity, Software Engineering, or a related field. * 3+ years of experience in Web3 application security and penetration testing. * Proven track record of identifying critical vulnerabilities across the blockchain protocol stack, Web2, and Web3 components. * Extensive knowledge of the blockchain ecosystem, including L1/L2 networks, DeFi protocols, and staking mechanisms. * Deep understanding of Web2 security concepts and common vulnerabilities (e.g., OWASP Top 10, SANS Top 25). * Strong analytical skills to identify trends and patterns in vulnerabilities. * Excellent communication skills for engaging with internal teams. * Passion for security and a drive to improve Web3 security posture. * Ability to work independently and take ownership of penetration testing initiatives. * Energy and self-drive for continuous learning in the rapidly evolving crypto space. * Excellence in clear, direct, and kind communication with technical and non-technical stakeholders. * Experience building relationships with product, engineering, and security teams. *Nice to haves:* * Participation in CTFs, bug bounty programs, or open-source security research. * Expertise in Application Security, Network Security, or Cloud Security. * Relevant security certifications (e.g., OSCP, GPEN). * Experience developing and implementing security tooling to support bug bounty triage and analysis. * Experience with bug bounty programs and platforms, including triage, validation, and researcher communication. * Strong analytical skills to identify trends and patterns in bug bounty submissions. * Excellent communication skills to effectively engage with bug bounty researchers. Position ID: P69494 \#LI-remote *Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)). Pay Range: $152,405-$179,300 USD Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying. Commitment to Equal Opportunity Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law. Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations*********************************** *Global Data Privacy Notice for Job Candidates and Applicants* Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required. *AI Disclosure* For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description. For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate. *The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
    $152.4k-179.3k yearly 60d+ ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in West Sacramento, CA?

The average cyber security analyst in West Sacramento, CA earns between $74,000 and $144,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in West Sacramento, CA

$104,000
Job type you want
Full Time
Part Time
Internship
Temporary