Post job

Cyber security analyst jobs in Yuma, AZ

- 957 jobs
All
Cyber Security Analyst
Securities Analyst
Information Security Engineer
Cyber Security Engineer
Senior Security Engineer
Security Systems Specialist
Information Security Analyst
Security Engineer
Information Systems Security Officer
  • Acquisition Security Analyst

    Mantech 4.5company rating

    Cyber security analyst job in Los Angeles, CA

    MANTECH seeks a motivated, career and customer-oriented Acquisition Security Analyst II to join our team in El Segundo, CA. The Acquisition Security Analyst II will assist the Government Program Manager with the development and implementation of comprehensive program protection methodologies to protect advanced technology programs throughout the system's lifecycle. Responsibilities include but are not limited to: In-depth lifecycle program analysis to identify critical program information (CPI), Critical System Resources (CSR), and their associated vulnerabilities. Assist with the identification and implementation of countermeasures. Develop and implement a risk management-based program protection plan and strategy. Provide security recommendations to the PM, GSSO, and cognizant security authorities as to the Air Force acquisition and sustainment process. Maintain a working relationship with the PM, Contracting Officer and contractor security officers to ensure a standardized and correct format/process is utilized for all DD Form 254 efforts throughout the acquisition and sustainment lifecycle, in coordination with Program Security Officers. Conduct analysis of foreign intelligence threats against programs involving customer's critical research, sensitive technologies or CPI. Prepare and produce analytical products from numerous resources, to include various databases, to ensure a real-time, tailored product is provided. Write, review, and/or edit Security Classification Guides (SCG), Exposure Contingency Plans (ECP), Managed Access Plans (MAP), Security Operating Procedures (SOPs), System Test Plans (STP) Provide technical analysis and OPSEC support to SMC or AFSPC Special programs and other associated operations, missions, and organizational elements involved in developing system requirements to associated systems RDT&E. Minimum Qualifications: Bachelor's degree in a related area; an additional 4 years of related experience might be considered for a degree. 10+ years of related experience with acquisition programs 6+ years of experience with SCI programs. Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents. Must have extensive knowledge of the DD Form 254 and how it is incorporated in the Air Force acquisition process. Willingness to travel within the scope of the Program's Area of Responsibility (AOR) (note- could be extensive, and will include both air and ground transportation) Preferred Qualifications: 4+ years of experience with SAR program acquisitions desired. Working knowledge of Microsoft Office (Word, PowerPoint, and Excel) Possess a high degree of originality, creativity, initiative requiring minimal supervision. Have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners. Security Clearance: Current Top Secret Clearance with SCI Eligibility Eligibility for access to Special Access Program Information Willingness to submit to a polygraph. Physical Requirements: Must be able to remain in a stationary position 50%. Needs to occasionally move about inside the office to access file cabinets, office machinery, etc. Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer. Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
    $67k-89k yearly est. 4d ago
  • Cyber Security Analyst

    Insight Global

    Cyber security analyst job in Irvine, CA

    Required Skills & Experience: Bachelor's degree in a related field preferred but not required. 5+ years of experience in a SOC or similar security environment. Expertise with SIEM, EDR, CSPM tools; strong skills in SQL/KQL/Cypher for data analysis. Proven ability to lead complex investigations and coordinate across technical and business stakeholders. Solid understanding of cybersecurity frameworks (MITRE ATT&CK, NIST CSF, NIST SP800-61r3). Experience with log aggregation technologies and SIEM tuning processes. Job Description: A large financial services customer based in Irvine, CA is seeking a Cyber Security Operations Analyst, focused on Incident Response. This individual will lead Incident Response, and act as a technical expert within the SOC. This team protects the organization from cyber threats. This role requires strong analytical skills, leadership in high-severity incidents, and deep knowledge of security tools and frameworks. Pay: 50-65/hr
    $81k-114k yearly est. 2d ago
  • Cyber Security Engineer

    Atomus

    Cyber security analyst job in Fremont, CA

    About the Company Atomus' mission is to provide world class cybersecurity for the world's most critical organizations. We build security compliance software delivered as managed services sold directly, with relevant professional services and support. Examples of our commercial customers include hypersonic aircraft companies, satellite and space mission systems companies, AI and software companies, among many other companies serving primarily the aerospace and defense industry. At Atomus we are hardworking, we move fast, and we put our customers first. About the Role As a Cybersecurity Engineer will work closely with customers to help them implement and fully leverage Atomus' cybersecurity products, maintain compliance with NIST 800-171 and CMMC cybersecurity standards, and solve technical challenges. Our customers depend on Atomus to manage and secure their Windows, MacOS, Ubuntu, iOS, Android devices, and Firewalls while ensuring compliance. We aim to provide the best possible support when they have questions. Our team's main goal is to simplify our customers' lives, for compliance and security. You will serve as the voice of the customer by sharing their feedback and insights with our product team and reporting any issues to our software engineers. We take pride in delivering amazing experiences for our customers. Responsibilities Manage and guide new customers through the onboarding process, ensuring proper setup, configuration, and alignment with their security programs and establishing baseline compliance requirements of NIST 800-171 and CMMC while performing technical tasks/project management required for onboardings. Serve as the first point of contact for technical inquiries, providing debugging, troubleshooting, and solutions for technical IT/security issues related to the Atomus platform. Work closely with internal teams (sales, product, engineering) along with partners/vendors for customer requirements to communicate customer feedback and advocate for customer needs in product development and rolling out 3rd party products. Assist customers in managing and maintaining NIST 800-171 and CMMC compliance requirements, ensuring IT documentation is updated and maintained. Required Skills Experience in a customer-facing technical role, IT administrator, solutions engineer, Technical Customer Success, or TAM role preferably in cybersecurity or compliance. Strong experience with cybersecurity frameworks and technologies (e.g., NIST, CMMC, firewalls, routers, encryption tools). Intermediate networking knowledge of WAN and LAN connectivity, routers, firewalls, switches, security, etc. Experience with Microsoft Intune, Active Directory, Windows, MacOS and ABM, as well as mobile platforms like Android and iOS. Advanced understanding of Microsoft products (Exchange, SharePoint, Windows, Windows Server, Active Directory, etc.). Familiarity with command-line tools (e.g., PowerShell, Terminal) for troubleshooting and deployment. Strong troubleshooting skills, particularly related to network security, software issues, and IT environments. Excellent verbal and written communication skills; ability to explain complex topics to both technical and non-technical audiences. Applicants must have strong emotional intelligence to intuit and match customer sentiment for effective communication. Preferred Skills Prior experience with NIST 800-171, CMMC, or other compliance standards. Ability to manage multiple customer accounts and onboarding projects simultaneously. Familiarity with CRM platforms (HubSpot), and compliance documentation tools while managing SLAs which include customer satisfaction, initial response, and issue resolution times.
    $102k-145k yearly est. 3d ago
  • Information Security Engineer

    Irvine Technology Corporation

    Cyber security analyst job in San Francisco, CA

    We are in need of a InfoSec Engineer to join our global client on a direct hire basis. In this role you will be responsible for leading and executing information security operations across multiple locations, with a primary focus on incident response, security technologies, change management, and continuous improvement. This role safeguards the organization's digital assets by designing, implementing, and maintaining key processes and technologies such as intrusion detection, malware protection, zero-day threat mitigation, firewalls, internet filtering, and SIEM tools. Location: San Francisco, CA (Hybrid - 3 days on-site) This job expects to pay about $125,000 - $155,000 per year plus benefits What You Will Do: Security Operations & Incident Response Assist with 24x7 security operations, ensuring continuous availability and performance of critical security systems. Support aspects of incident response, including detection, escalation, containment, service recovery, and root cause analysis. Tune and configure IDS/IPS, antivirus, firewall, vulnerability management, and application assessment tools to ensure optimal protection and performance. Implement and maintain automated monitoring and logging processes; conduct regular log reviews and threat detection. Manage escalations from the Security Operations Center (SOC) and drive timely resolution of critical issues. Identify, track, and communicate key risks and security concerns using a metrics-based approach. Continuously improve incident response processes, system documentation, monitoring tools, and recovery procedures. Security Technologies & Compliance Administer and support a range of security tools and technologies including SIEM, intrusion detection/prevention systems, malware protection, encryption, and content filtering. Ensure compliance with internal information security policies and external regulatory frameworks (e.g., NIST, ISO). Develop, maintain, and enforce security documentation, workflows, and access control procedures. Monitor compliance across systems; identify gaps and coordinate remediation with stakeholders. Governance, Metrics & Strategic Planning Develop and maintain security metrics to inform leadership and guide strategic decisions. Provide input into the organization's overall information security strategy to ensure alignment with business goals. Contribute to the continuous improvement of documentation, monitoring capabilities, automation, and recovery plans. Vendor & Partner Oversight Manage relationships with third-party security vendors and service providers, ensuring contractual obligations, service quality, and compliance are met. Oversee change management activities related to externally managed security platforms and services. Collaborate with managed service providers (MSPs) to drive operational improvements and automation. Additional Responsibilities Partner with cross-functional teams to support the deployment and maintenance of security tools and services. Oversee daily security operations and escalate critical issues as appropriate. Support additional information security projects or initiatives as assigned. What You Bring to The Table: Bachelor's Degree in relevant field or other relevant professional experience 4-5+ years of experience in enterprise information security operations, with hands-on expertise in IDS/IPS, SIEM, malware protection, firewalls, and incident response Strong understanding of compliance and risk frameworks: NIST, ISO 27001 Demonstrated experience with security monitoring, threat detection, and forensic analysis. Proven ability to develop, execute, and mature operational security processes and documentation Skilled in managing security vendors and third-party services, including contract and performance oversight Excellent written and verbal communication skills, with the ability to present technical concepts clearly to both technical and non-technical stakeholders Strong attention to detail Proficient in Microsoft Office, web-based collaboration tools, and security platforms CISSP, CISM, CISA, GCIH, CEH or other related information security certifications preferred Experience with Rapid7, Zscaler, and Fortinet firewalls is a plus Experience working in a Microsoft environment is a plus Irvine Technology Corporation (ITC) is a leading provider of technology and staffing solutions for IT, Security, Engineering, and Interactive Design disciplines servicing startups to enterprise clients, nationally. We pride ourselves in the ability to introduce you to our intimate network of business and technology leaders - bringing you opportunity coupled with personal growth, and professional development! Join us. Let us catapult your career! Irvine Technology Corporation provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, Irvine Technology Corporation complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities.
    $125k-155k yearly 5d ago
  • Information Security Engineer

    Unigen Corporation 4.4company rating

    Cyber security analyst job in Newark, CA

    Job Title: Security Engineer Department: IT Reports to: IT Manager Job Overview: The Security Engineer is responsible for designing, implementing, and managing the security infrastructure that protects our applications, data, and networks. This role plays a critical part in threat detection, risk mitigation, and the development of secure architectures while ensuring compliance with industry standards and regulatory requirements. Primary Responsibilities: Design, deploy, and manage security tools and technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection). Monitor systems and networks for security events, investigate incidents, and lead remediation efforts. Perform threat modeling, risk assessments, and application security reviews. Conduct vulnerability assessments and penetration tests to identify and address security gaps. Develop, implement, and maintain security policies, standards, and procedures aligned with frameworks such as NIST, ISO 27001, SOC 2, and GDPR. Build and maintain secure cloud and infrastructure configurations (e.g., GCP, Oracle Cloud). Conduct code and architecture reviews with a focus on security best practices. Partner with DevOps, IT, and engineering teams to integrate security across the software development lifecycle (DevSecOps). Stay informed about emerging threats, vulnerabilities, and regulatory updates (e.g., ISO 27001, ITAR, CMMC 2.0). Deliver security awareness training to internal teams. Collaborate with compliance, legal, and business stakeholders to support audits and regulatory obligations. Qualifications: Bachelor's degree in Computer Science, Cybersecurity, or a related field. 5+ years of hands-on cybersecurity experience. Strong knowledge of security frameworks and protocols (e.g., NIST, ISO 27001, SOC 2, CIS). Expertise in network security, system hardening, and secure coding practices. Practical experience with SIEM, IDS/IPS, EDR, firewalls, and vulnerability management tools. Due to U.S. export control laws and regulations (ITAR), this position requires U.S. Person status. Preferred: Industry certifications such as CISSP, OSCP, or GIAC. Experience with security audits, penetration testing, or participation in red/blue team exercises. Strong communication skills with the ability to articulate complex security concepts to both technical and non-technical audiences. Experience in an Electronics Manufacturing environment is a plus.
    $116k-162k yearly est. 4d ago
  • Cybersecurity risk security analyst

    Sigmaways Inc.

    Cyber security analyst job in Sonoma, CA

    We are seeking a Cybersecurity Risk Analyst to support managing and mitigating security risks across processes, technologies, and cloud environments. The ideal candidate will combine technical expertise, business acumen, and cybersecurity experience to advise partners, assess risks, and drive improvements in secure operations. This role requires hands on experience with Kusto Query Language (KQL), cloud security, and risk assessment, as well as the ability to communicate effectively with stakeholders at all levels. Must be local to San Francisco or Los Angeles (LA) or Salt Lake City (SLC). Responsibilities: Support risk strategies by identifying and mitigating security risks in bank systems and processes. Apply and interpret security policies, provide guidance and input on policy enhancements. Advise business and technical partners on security controls, procedures, and best practices. Assess cloud and on-prem environments to identify risks and recommend control improvements. Conduct security control assessments, document findings, and develop actionable remediation plans. Evaluate third-party vendors to determine shared security responsibilities and associated risks. Communicate security risks and mitigation strategies effectively to technical teams and executives. Collaborate across teams to drive secure operations and deliver results in a fast-paced environment. Qualifications: Bachelor's degree in Cybersecurity, Information Security, Computer Science, or related technical discipline (or equivalent experience). 3+ years of experience in cybersecurity, information security, or technology risk management. Proficiency in Kusto Query Language (KQL) for data analysis, log correlation, and threat detection. In-depth understanding of security frameworks such as NIST, ISO 27001, or FedRAMP. Demonstrated experience assessing and improving security posture across Cloud (Azure, AWS) and on-premises environments. Proven ability to conduct security control assessments, identify risk exposures, and develop actionable remediation plans. Skilled at translating technical security concepts into clear, business-relevant insights for stakeholders and executives. Excellent communication, collaboration, and interpersonal skills, with a focus on building trusted partnerships across technical and business teams. Strong organizational and analytical skills, with the ability to manage multiple initiatives in a fast-paced, results-driven environment.
    $91k-136k yearly est. 4d ago
  • Senior Security Cloud Engineer - Top VC Firm

    Saragossa

    Cyber security analyst job in Menlo Park, CA

    Help support the CISO at one of the world's largest venture capital firms, working at the intersection of cloud security, AI and cutting-edge technology. You'll be joining a lean and highly technical security team, where your impact will be immediate and visible. This role is balanced between seniority and technical depth. You'll be trusted to support and advise the CISO, contribute to strategic decisions and act a senior technical voice, while remaining deeply hands-on as a cloud security engineer. The environment is heavily cloud based, (primarily Azure, with some AWS) and increasingly focussed on AI platforms and MCP workloads. You'll work closely with AI development, data engineering and platform teams to ensure security is embedded. Ideally, you'll be coming from a similar role, operating in a senior position while remaining technical day-to-day, with coding in python, terraform or SQL. Whilst this role requires general security experience, you will need to have a background specifically in cloud security. This role is based in Menlo Park. Interested in finding out more? No up-to-date resume required.
    $131k-183k yearly est. 2d ago
  • Security Analyst

    Robert Half 4.5company rating

    Cyber security analyst job in Los Angeles, CA

    We are seeking an Information Security Analyst to support enterprise security operations with a focus on vendor risk management, security control integration, and infrastructure security. This role is responsible for conducting security assessments, coordinating the implementation of core security services (including SSO, logging, IAM, and data protection), and supporting compliance activities aligned with frameworks such as NIST and ISO 27001. The ideal candidate has experience in cybersecurity risk management, cloud environments (AWS/Azure), and collaborating with technical teams to ensure the effective delivery of security controls. At least 2+ years of experience in the following: Security & Compliance Frameworks NIST CSF ISO 27001 CIS Controls ITIL SOC 2 PCI DSS FedRAMP GDPR / CCPA Vendor Risk & GRC Tools OneTrust SIG (Standardized Information Gathering) Other GRC/TPRM platforms Identity, SSO & Access Management SSO (PingFederate, SAML) Active Directory Azure AD AWS IAM
    $74k-112k yearly est. 5d ago
  • Information Security Analyst

    Strategic Staffing Solutions 4.8company rating

    Cyber security analyst job in Chandler, AZ

    STRATEGIC STAFFING SOLUTIONS HAS AN OPENING! This is a Contract Opportunity with our company that MUST be worked on a W2 Only. No C2C eligibility for this position. Visa Sponsorship is Available! The details are below. “Beware of scams. S3 never asks for money during its onboarding process.” Job Title: Information Security Analyst Location: Chandler, AZ 85286 Onsite Work Contract Length: 6+ Months Pay: 45-48 an hr on W2 Overview We are seeking an Information Security Analysts to support a Central Access Provisioning team during a transition from a manual to an automated Identity and Access Management (IAM) environment. These roles will also provide flexible support across IAM Operations teams to address capacity needs resulting from workforce attrition and evolving operational demands. The ideal candidates will have hands-on experience with IAM tools, strong foundational knowledge of authentication standards, and the ability to operate effectively in a regulated, security-focused environment. Key Responsibilities Support Identity and Access Management (IAM) operations, including access provisioning and related security processes. Participate in low- to moderately complex information security initiatives and identify opportunities for process improvement. Review, analyze, and resolve basic to intermediate information security assignments requiring research, evaluation, and selection of appropriate solutions. Assist with low- to medium-risk deliverables in alignment with established policies, procedures, and compliance requirements. Develop and present recommendations to address security-related issues, exercising independent judgment within defined guidelines. Provide timely and accurate information to internal stakeholders and client personnel related to information security analysis. Collaborate with cross-functional teams and interact effectively with multiple levels of leadership. Manage priorities, meet deadlines, and deliver high-quality results in a fast-paced environment. Required Qualifications Minimum of 2 years of experience in Information Security Analysis or a related field, or equivalent experience demonstrated through a combination of work experience, consulting, training, military service, or education. Hands-on experience with IAM tools, such as: SailPoint Okta CyberArk Ping Microsoft Entra ID (Azure AD) Working knowledge of authentication and identity standards, including: LDAP SAML OAuth OpenID SCIM Familiarity with security and compliance frameworks, such as ISO, NIST, SOX, and PCI. Strong organizational skills with the ability to multitask and prioritize competing requests. Customer-service mindset with a demonstrated ability to respond to requests in a timely and professional manner. Proficiency in Microsoft Office applications, including Word, Excel, Outlook, PowerPoint, Access, and Project.
    $100k-137k yearly est. 1d ago
  • Infrastructure & Security Engineer (Platform)

    Meanwhile

    Cyber security analyst job in San Francisco, CA

    In this role, you will drive the evolution of our infrastructure and security posture. You will have substantial ownership over our technology choices and implementation for deployment, observability, storage, and security. You will identify, triage, and implement incremental improvements in all of these domains, working closely with backend engineers and internal and external auditors to develop appropriately scoped interventions. You will work with engineers to ensure that security considerations are baked into software development from the outset. You should have a broad understanding of modern best practices around cloud architecture, data governance and infrastructure as code. You should approach questions of infrastructure and security risk with a sense of nuance and good judgment. You should be able to build consensus around your threat models such that the necessary consequences seem natural to other stakeholders. In this role, you will need to be fluent in Python and Terraform (at least to start). Company & Funding We're building the world's largest long-term insurer, using digital money and AI to serve billions of people profitably. We want anyone, anywhere, to be able to save for their future, protect their family, and build wealth across generations. We face a once-in-a-century opportunity to build a vertically integrated life (re)insurer. Our product offerings are globally unique, making it possible for us to scale our balance sheet, build modern systems from scratch, and then directly compete to win a market that is 3% of global GDP. We've raised over $140M to date. Sam Altman and Lachy Groom led our initial raise, and they've since been joined by leading investors in AI, insurance, and Bitcoin, including Northwestern Mutual, Apollo, Bain Capital, Pantera, Haun, Framework, Fulgur Ventures, MS&AD, Mouro, Stillmark, and Wences Casares. Our Bermuda operating subsidiary holds the the world's only license to issue life insurance denominated entirely in Bitcoin. It's also the only company in the world with audited financials stated in Bitcoin. (If you join us, you can expect to do a lot of things no one's ever done before.) Engineering at Meanwhile With the advent of ubiquitous AI tooling, the dynamic range in individual engineering effectiveness is only widening. At Meanwhile, we're planning for a world in which small, tight-knit engineering teams (supported by a small, tight-knit platform team) own entire lines of business, and are compensated accordingly. We're attacking a huge market with the leanest, most effective team in insurance. Where incumbents employ a thousand people, we think we can make it work with a hundred or a dozen. We're looking for hungry ICs (and former managers who see the writing on the wall) interested in pushing the boundaries of engineering productivity in a vertically integrated, regulated organization. We're growing quickly. You will fix million-dollar bugs. On the business side, we hire for deep domain expertise, ambition, and the creativity to figure out the previously impossible. Because our engineers work closely with people from the business, they need curiosity, flexibility, an appetite for (and the ability to digest) complex context, and strong communication skills. Our view is that ownership is taken, not given. You will be successful here if your work progressively builds others' trust in your ability to identify, attack, and solve larger and larger problems, including those that no one else has anticipated. We believe that "code wins arguments," that prototyping is often the best first step in a design process, and that the impact of velocity is non-linear. You are excited by putting up multiple meaningful changes, or writing thousands of lines of code, in a day (even though you know that deleting lines of code is more exciting than writing them, and that, occasionally, deep reflection is required in order to ship anything). You aren't fazed by building systems that don't work out - sometimes, you have to throw code away. Intellectual honesty is non-negotiable. You love to learn and to teach, to ask questions and to answer them, and to be transparent about your uncertainty. You are eager to learn, with the rest of the team, how to work with AI tools, including agents, in order to move faster and ship better, more complete versions of your ideas. You will experiment with new ways of working, with the expectation that some of them will be unsuccessful, and you will teach others what works. This is the most exciting time in decades to be a competent, technically ambitious engineer. We want to offer you the opportunity to see what's really possible and how much better you can get at your craft.
    $114k-163k yearly est. 4d ago
  • Senior Backend Engineer - Cloud Security

    Droisys 4.3company rating

    Cyber security analyst job in Sunnyvale, CA

    About Company, Droisys is an innovation technology company focused on helping companies accelerate their digital initiatives from strategy and planning through execution. We leverage deep technical expertise, Agile methodologies, and data-driven intelligence to modernize systems of engagement and simplify human/tech interaction. Amazing things happen when we work in environments where everyone feels a true sense of belonging and when candidates have the requisite skills and opportunities to succeed. At Droisys, we invest in our talent and support career growth, and we are always on the lookout for amazing talent who can contribute to our growth by delivering top results for our clients. Join us to challenge yourself and accomplish work that matters. We're hiring Senior Backend Engineer - Cloud Security in Sunnyvale, CA What You Will Do Build containerized microservices and related components for a multi-tenant, distributed system that ingests and processes real-time cloud events, system telemetry, and network data across major cloud platforms. Your work will enable customers to detect risks and strengthen their cloud security posture. Mentor junior engineers, interns, and new graduates, helping them develop strong technical skills and become effective contributors. Write production-quality software primarily in Java using Spring Boot, and work extensively with Kafka, SQL, and other data interfaces. Work within a Kubernetes-based service infrastructure, while learning new technologies as needed. Take ownership of major features and subsystems through the entire development lifecycle-requirements, design, implementation, deployment, and customer adoption. Participate in operational responsibilities, gaining firsthand experience with real-world performance, reliability, and support scenarios-informing how you design and build better systems. Prioritize quality at every stage, performing thorough developer testing, functional validation, integration checks, and performance testing to ensure highly resilient systems. Collaborate closely with Product Management to review, refine, and finalize requirements. Develop a deep understanding of customer needs by engaging with peers, stakeholders, and real-world use cases. What You Bring Bachelor's degree in computer science or similar (Master's preferred). 5+ years of experience building scalable, distributed systems. Passion for software engineering, continuous learning, and working in a collaborative environment. Hands-on experience with AWS, Azure, or GCP, with strong familiarity at the API/programming level. Experience with networking and/or security concepts is a plus. Experience developing containerized services on Kubernetes is strongly desired. Strong programming experience in Java/Spring Boot or Golang. Experience building or using REST APIs. Knowledge of infrastructure-as-code tools such as CloudFormation, Terraform, or Ansible is a plus. Understanding of TCP/IP networking fundamentals. Experience developing in Unix/Linux environments. Droisys is an equal opportunity employer. We do not discriminate based on race, religion, color, national origin, gender, gender expression, sexual orientation, age, marital status, veteran status, disability status or any other characteristic protected by law. Droisys believes in diversity, inclusion, and belonging, and we are committed to fostering a diverse work environment
    $119k-160k yearly est. 3d ago
  • Information Security Engineer

    Intraedge 3.9company rating

    Cyber security analyst job in Phoenix, AZ

    We're looking for an Information Security Engineer to join our team and help strengthen our endpoint, access, and compliance security posture across the organization. If you thrive in a fast-paced environment and enjoy solving complex security challenges, we'd love to connect. 🔐 Key Responsibilities Support endpoint and access security across Windows and mac OS environments. Review and validate privileged access requests using least-privilege principles. Assist in developing and implementing security policies, elevation rules, and device configurations. Troubleshoot security-related issues, including elevation failures and policy conflicts, using tools like BeyondTrust EPM. Participate in compliance and governance initiatives, including secure analytics and data protection efforts. Prepare clear documentation, meeting updates, and stakeholder communications. Contribute to continuous improvements in cyber engineering and endpoint security. 💡 Ideal Candidate Experience with endpoint security tools (e.g., BeyondTrust, EDR, MDM). Strong understanding of access control, least-privilege frameworks, and security best practices. Ability to collaborate with cross-functional teams and communicate effectively. Curious, proactive, and ready to solve complex security problems.
    $80k-104k yearly est. 4d ago
  • Information Security Engineer 3 - Contingent

    PTR Global

    Cyber security analyst job in Chandler, AZ

    This candidate will provide tuning support for Security AI for structured and unstructured scanning to executes data classification efficacy validation strategy. This position will require that the candidate apply accurate feedback and prevent cascading misclassifications across thousands of columns. Monitor tuning impact and ensure compliance alignment. Maintain governance integrity and audit readiness. Without this role, misclassifications could propagate unchecked, leading to compliance risks and poor data quality. Key skills include data classification and semantic similarity of enterprise data, analytics and governance and platform technical awareness. In this contingent resource assignment, candidate may: Consult on or participate in moderately complex initiatives and deliverables within Information Security Engineering and contribute to large-scale planning related to Information Security Engineering deliverables. Review and analyze moderately complex Information Security Engineering challenges that require an in-depth evaluation of variable factors. Contribute to the resolution of moderately complex issues and consult with others to meet Information Security Engineering deliverables while leveraging solid understanding of the function, policies, procedures, and compliance requirements. Collaborate with client personnel in Information Security Engineering. Required Qualifications: 4 plus years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work or consulting experience, training, military experience, education. Pay Range: $55-60$ The specific compensation for this position will be determined by a number of factors, including the scope, complexity and location of the role as well as the cost of labor in the market; the skills, education, training, credentials and experience of the candidate; and other conditions of employment. Our full-time consultants have access to benefits including medical, dental, vision and 401K contributions as well as any other PTO, sick leave, and other benefits mandated by appliable state or localities where you reside or work.
    $55-60 hourly 2d ago
  • Information Security Engineer

    ML Outsourcing Services Private Limited

    Cyber security analyst job in Chandler, AZ

    Role: Information Security Engineer Contract: 12 months Key Responsibilities) Provide tuning and optimization support for Securiti AI data discovery and classification (structured & unstructured data). Execute data classification efficacy validation strategies to ensure high accuracy and consistency. Apply precise feedback mechanisms to prevent cascading misclassifications across thousands of columns and datasets. Monitor and analyze tuning impact on classification results and ensure ongoing compliance alignment. Maintain data governance integrity and support audit readiness. Perform internal data scanning across servers and virtual machines. Scan and analyze large-scale datasets (up to 100+ TB) across enterprise platforms. Work with cloud-based data sources, primarily on AWS. Collaborate with analytics, governance, security, and platform teams to align classification outcomes. Support regulatory compliance efforts related to GDPR, SOX, and other data protection frameworks. Utilize SQL or other database technologies to analyze, validate, and troubleshoot classification results. Develop scripts and automation to support scanning, tuning, and reporting activities. Required Skills & Qualifications 4-6 years of experience in data classification, data governance, or data analytics roles. Hands-on experience with Securiti AI or similar data discovery and classification platforms. Strong understanding of data classification techniques and semantic similarity across enterprise data. Experience scanning structured and unstructured data at scale. Proficiency in SQL and experience with relational or enterprise databases. Experience working with cloud platforms, preferably AWS. Knowledge of GDPR, SOX, or other data privacy and compliance regulations. Strong problem-solving and analytical skills. Experience with scripting (Python, Shell, or similar) for automation and analysis. Ability to scan data from servers and virtual machines. Nice-to-Have Skills Experience with data governance frameworks and tools. Familiarity with metadata management, data catalogs, and audit reporting. Exposure to AI/ML-driven classification or NLP-based data discovery. Prior experience in large-scale enterprise data environments. “Mindlance is an Equal Opportunity Employer and does not discriminate in employment on the basis of - Minority/Gender/Disability/Religion/LGBTQI/Age/Veterans.”
    $86k-119k yearly est. 3d ago
  • Information Security Analyst

    The Judge Group 4.7company rating

    Cyber security analyst job in Chandler, AZ

    Our client is currently seeking a Information Security Engineer 3 ***W2 only, No corp to corp - No 1099 - No 3rd party*** Information Security Engineer 3 Schedule: Friday-Monday, 10:30am-8:30pm AZT Contract with potential to convert to full-time Pay: $53-$57 HR Role Overview This role supports the Cyber Threat Fusion Center, specifically covering weekend operations. The consultant will work closely with threat analysts, incident responders, and engineering teams to monitor, investigate, and respond to security events across the enterprise. There is potential for: Full‑time conversion, and Transition to the weekday team if a position opens due to promotion or movement. Core Technical Skills (Required) Splunk - SIEM monitoring, alert triage, dashboarding, log analysis CrowdStrike Falcon - EDR investigation, threat hunting, incident response Nice-to-Have Skills FireEye - Malware and threat analysis Palo Alto XSOAR - Case management and automation workflows NetWitness - Network traffic analysis and packet investigation Experience Requirements 2-3 years working in a Security Operations Center (SOC) or Cyber Threat Fusion Center Hands-on experience with incident response, threat detection, and security monitoring Additional Notes Candidates must be willing to work the Friday-Monday schedule
    $53-57 hourly 1d ago
  • Sr. Security Engineer

    Oscar 4.6company rating

    Cyber security analyst job in Scottsdale, AZ

    My client seeking a Security Engineer with deep experience in Azure cloud environments and Fortinet security technologies. This role is responsible for strengthening the organization's cloud security posture, supporting defensive and offensive security initiatives, and ensuring ongoing compliance with SOC2 and GDPR requirements. The ideal candidate has a strong foundation in Azure security architecture, hands-on experience deploying and managing FortiGate solutions in cloud environments, and a practical understanding of both blue-team and red-team methodologies. This is a highly collaborative position in a fast-moving, multi-tenant environment, requiring strong technical judgment, attention to detail, and the ability to design secure solutions at scale. Details: $120k - $130k Full-Time, Permanent Position Scottsdale, AZ | 5 Days On-Site Key Responsibilities: Design, implement, and maintain security controls across Azure workloads, identities, networks, and data services. Manage Azure security posture using Microsoft Defender for Cloud, Azure Policy, and associated tooling. Ensure proper network segmentation, firewall enforcement, and secure connectivity across cloud environments. Deploy, configure, and manage Fortinet technologies within Azure, including FortiGate firewalls and related services. Optimize firewall rules, routing, logging, and monitoring to enhance threat visibility and reduce attack surface. Support offensive-focused initiatives by identifying misconfigurations, modeling potential attack paths, and validating risks. Support SOC2 control implementation, evidence collection, access reviews, and continuous compliance efforts. Contribute to the development, documentation, and enforcement of security policies and procedures. Support secure deployment pipelines, identity governance practices, and operational security improvements. Participate in security architecture reviews for new systems and integrations. Required Qualifications 5-7 years of experience in cloud security or cloud engineering roles. 5+ years of Azure experience, including networking, identity, governance, and security services 5+ years of experience with Fortinet, ideally FortiGate firewalls deployed in Azure. Practical understanding of both defensive (blue team) and offensive (red team) security concepts. Experience working within or supporting SOC2 programs. Proficiency with scripting/automation (PowerShell or C#) Good-to-Haves: Exposure to DevSecOps practices, CI/CD pipeline hardening, or IaC security scanning. Certifications such as AZ-500, SC-200, SC-300, Fortinet NSE certifications, or similar. Exposure to GDBR Oscar Associates Limited (US) is acting as an Employment Agency in relation to this vacancy.
    $120k-130k yearly 5d ago
  • Data Security Engineer

    Mindlance 4.6company rating

    Cyber security analyst job in Chandler, AZ

    Role: Information Security Engineer Contract: 24 months In this contingent resource assignment, you may: Consult on complex initiatives with broad impact and large-scale planning for Information Security Engineering. Review and analyze complex, multi-faceted, larger-scale, or longer-term Information Security Engineering challenges that require in-depth evaluation of multiple factors, including intangibles or unprecedented factors. Contribute to the resolution of complex and multi-faceted situations requiring a solid understanding of the function, policies, procedures, and compliance requirements that meet deliverables. Strategically collaborate and consult with client personnel. Required Qualifications: 5+ years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work or consulting experience, training, military experience, or education. Required Qualifications: Experience with encryption technologies with emphasis on OpenText Core Data Privacy and Protection (Voltage) Unix/Linux Systems Administration experience with in-depth knowledge of troubleshooting, OS hardening, and OS tuning Change management experience 3+ years of compliance experience Experience with scripting tools such as bash, Python, PowerShell, etc. Desired Qualifications: Intermediate to advanced level experience with scripting/automation using tools such as Bash, PowerShell, Python, Ansible, VBScript, JavaScript, UI path, etc. 2+ years of application development experience Experience with DevOps and CI/CD automated build and deployment processes. Knowledge and understanding of implementing infrastructure upgrades, security patches, or version upgrades. Knowledge and understanding of Splunk EEO: “Mindlance is an Equal Opportunity Employer and does not discriminate in employment based on - Minority/Gender/Disability/Religion/LGBTQI/Age/Veterans.”
    $90k-118k yearly est. 5d ago
  • F-35 Information System Security Officer - (Mid-Career)

    Lockheed Martin 4.8company rating

    Cyber security analyst job in Yuma, AZ

    What We're Doing: Lockheed Martin's, Rotary & Mission Systems (LM RMS), F-35 Cyber Security invites you to step up to one of today's most daunting challenges: the protection of exquisite government capabilities leading to warfighter supremacy against our peer and near peer adversaries. As a cybersecurity professional at Lockheed Martin, you'll safeguard the sensitive information and warfighting capabilities that our citizens and the world depend upon to protect U.S. and ally interests. Here, you'll work alongside other cybersecurity experts, related departments, and military members to support the military operational objectives by providing them with a safe and secure operating environment. In this fast-paced, real-world environment, you'll draw on all your education and experience as well as the resources of Lockheed Martin to keep these exquisite capabilities protected. The Work: This Information System Security Officer (ISSO) position will support the Information System Security Manager (ISSM) in developing, maintaining and overseeing the cybersecurity of assigned classified and/or unclassified F-35 systems at MCAS Yuma. Typical ISSO responsibilities include but are not limited to: Ensuring required cybersecurity controls are implemented and validated, to include continuous monitoring actions for assigned systems. Supporting the development and maintenance of cybersecurity related plans and procedures. Monitoring for non-compliance, anomalous activity (i.e., threats), and effectively reporting such activity and associated risks. Ensuring POA&Ms or remediation plans are in place for vulnerabilities identified during monitoring activity, audits, inspections, etc. and implementing, or overseeing, corrective actions. Creating, collecting and retaining data to meet reporting requirements. Monitoring and correlating data (i.e., events) from a variety of sources (e.g., Splunk, ELA, ePO, ACAS, etc.) to identify and mitigate threats, vulnerabilities and non-compliance. Investigating, analyzing and responding to cyber events, incidents and non-compliance, including trend analysis, creating detailed written reports and briefing the appropriate parties. Identifying, implementing and enforcing requirements for the proper handling and storage of Government data and electronic media. Conducting self-inspections and preparing for customer inspections. Interacting professionally during the enforcement of security policy and procedures. Assigned systems may vary in classification, capabilities and complexity. Mission requirements may require other than first-shift work and additional responsibilities as assigned. Who we are: Lockheed Martin is a Cyber Security pioneer, partner, innovator and builder. In support of our many customers, the amazing members of our team are responsible for providing all aspects of cybersecurity support in a complex environment. In a rapidly growing enterprise, this role offers the opportunity to grow and hone the unique skills and experiences required as a cybersecurity expert to create, design and build solutions to some of the world's hardest engineering problems. Why Join Us: Your Health, Your Wealth, Your Life With our employees as our top priority, we provide diverse career opportunities designed to propel development and boost agility. Our flexible schedules, competitive pay and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. At Lockheed Martin, we place an emphasis on empowering our employees by fostering innovation. We believe that by applying the highest standards of business ethics and visionary thinking, everything is within our reach - and yours as a Lockheed Martin employee. Lockheed Martin values your skills, training and education. Come and experience your future! Final Transferable Secret security clearance; last Periodic Reinvestigation must be within the last five (5) years or enrollment in Continuous Vetting program. Ability to obtain and maintain Special Access Program (SAP) access. Possess a valid certification that meets or exceeds DoD 8570.01-M IAT II requirements. Meets: CCNA-Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP Exceeds: CASP+ CE, CCNP Security, CISA, CISSP (or Assc), GCED, GCIH, CCSP Prior experience in a cyber workforce role, as categorized by the NICE or DoD workforce frameworks. Prior experience as an ISSO, ISSM or related DoD Cyber Workforce Role on one or more F-35 information systems. Prior experience ensuring compliance with applicable laws, regulations, guidance and policies as they relate to DoD cybersecurity and SAPs (e.g., DoDI 8510.01, JSIG, DoDM 5205.07, NIST SP 800 series). Prior experience with the system authorization process, associated artifacts and their requirements (e.g., SSP, SCTM, Security CONOPs, SOPs). Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics. The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration. * At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility. If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications. Other Important Information By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Ability to work remotely Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility. Work Schedule Information Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits. Security Clearance Information This position requires a government security clearance, you must be a US Citizen for consideration. Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $93,200 - $164,450. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. (Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year. This position is incentive plan eligible. Pay Rate: The annual base salary range for this position in most major metropolitan areas in California, Massachusetts, and New York is $107,300 - $185,840. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. This position is incentive plan eligible.
    $107.3k-185.8k yearly 20d ago
  • Computer Security Systems Specialist

    Render Security Engineering

    Cyber security analyst job in Yuma, AZ

    We open closed systems. It's not just a slogan - it's our focus. We specialize in unraveling the complexities of IT systems to broaden understanding, enhance security, and ensure interoperability. We connect top talent with critical work, crafting robust partnerships and creating effective, real-world solutions. We are committed to moving quickly, embracing risks, and continuously challenging the status quo to achieve exceptional outcomes for our customers. Render is looking for a Computer Security Systems Specialist to join our highly competent and motivated Naval Air Warfare Center (NAWC) team. This position is located aboard Marine Corps Air Station (MCAS) Yuma, Arizona and will serve as the NAWC's on-site liaison for critical Information Technology (IT) networking, system administration, and communications initiatives. The role supports both ongoing operations and future mission requirements within a dynamic, fast paced, and highly rewarding program environment. Primary responsibilities include: Design, configure, maintain, and troubleshoot IP networks using Cisco , Fortinet, and Juniper hardware, inline network encryptors, firewalls, and other network devices (switches, routers, IDS/IPS, cryptographic equipment) Administer Windows domains, including OU management, Group Policy configuration and verification, WSUS patch cycles, and Active Directory maintenance Manage Linux servers, including patching, configuration management, and performance tuning Implement and maintain virtualization infrastructure (vCenter, ESXi, virtual distributed switches, virtual machines) Conduct vulnerability scanning with ACAS/Nessus, enforce DISA STIG compliance, and utilize automated tools such as Evaluate-STIG for security validation Implement, monitor, and maintain network and system security measures across multiple platforms Maintain detailed documentation for TDPs, wiring, cabling layouts, and configuration baselines Lead technology refresh projects, hardware swaps, and lifecycle upgrades Mentor and provide oversight to subordinate technical personnel QUALIFICATIONS (REQUIRED) Minimum 2 years relevant experience (5 years preferred) in combined network and system administration roles Strong knowledge of routing protocols and networking technologies: OSPF, RIP, VRF, VLAN, MPLS, IP multicast routing, IP QoS, IPSec Demonstrated expertise in both Windows and Linux administration, patch management, and enterprise integration Hands-on experience with enterprise-grade network hardware, virtualization platforms, and security compliance frameworks Proficiency in vulnerability scanning, DISA STIG compliance, and security hardening in accordance with DoD standards Proven ability to troubleshoot complex, multi-layer technical issues in mission-critical environments Strong documentation habits and adherence to configuration control best practices Active DoDD 8140/DoD 8570 certification Excellent written and verbal communication Experience with Microsoft Visio Must possess and maintain TS clearance Security+, CCNA, CCNP, GVF certifications ADDITIONAL QUALIFICATIONS (PREFERRED BUT NOT REQUIRED) Bachelor's degree in an Engineering or IT-related field; 5 years relevant experience Knowledge of Marine Corps Enterprise Network (MCEN) user and administrative processes Render offers exciting opportunities for professional growth, leave benefits, participating in 401(k) with matching opportunities consistent with plan qualifications. We also offer health, vision and dental benefits on a cost-sharing basis. Annual bonus can be included in compensation based on company performance and policy. This position has an annual salary range of $60,000 to $80,000 based on annualized USD. The offered rate will be based on the selected candidate's knowledge, skills, abilities, and/or experience and education and in consideration of internal pay equality. Employment decisions are made without regard to race, color, religion, sex, national origin, age, disability, or protected veteran status, in accordance with applicable federal, state, and local laws. Render prohibits retaliation and discrimination against employees or applicants who inquire about, discuss, or disclose their own or another individual's compensation, as required by law. Render participates in E-Verify to confirm employment eligibility under federal law.
    $60k-80k yearly Auto-Apply 60d+ ago
  • Cyber Security Engineer

    Atomus

    Cyber security analyst job in San Francisco, CA

    About the Company Atomus' mission is to provide world class cybersecurity for the world's most critical organizations. We build security compliance software delivered as managed services sold directly, with relevant professional services and support. Examples of our commercial customers include hypersonic aircraft companies, satellite and space mission systems companies, AI and software companies, among many other companies serving primarily the aerospace and defense industry. At Atomus we are hardworking, we move fast, and we put our customers first. About the Role As a Cybersecurity Engineer will work closely with customers to help them implement and fully leverage Atomus' cybersecurity products, maintain compliance with NIST 800-171 and CMMC cybersecurity standards, and solve technical challenges. Our customers depend on Atomus to manage and secure their Windows, MacOS, Ubuntu, iOS, Android devices, and Firewalls while ensuring compliance. We aim to provide the best possible support when they have questions. Our team's main goal is to simplify our customers' lives, for compliance and security. You will serve as the voice of the customer by sharing their feedback and insights with our product team and reporting any issues to our software engineers. We take pride in delivering amazing experiences for our customers. Responsibilities Manage and guide new customers through the onboarding process, ensuring proper setup, configuration, and alignment with their security programs and establishing baseline compliance requirements of NIST 800-171 and CMMC while performing technical tasks/project management required for onboardings. Serve as the first point of contact for technical inquiries, providing debugging, troubleshooting, and solutions for technical IT/security issues related to the Atomus platform. Work closely with internal teams (sales, product, engineering) along with partners/vendors for customer requirements to communicate customer feedback and advocate for customer needs in product development and rolling out 3rd party products. Assist customers in managing and maintaining NIST 800-171 and CMMC compliance requirements, ensuring IT documentation is updated and maintained. Required Skills Experience in a customer-facing technical role, IT administrator, solutions engineer, Technical Customer Success, or TAM role preferably in cybersecurity or compliance. Strong experience with cybersecurity frameworks and technologies (e.g., NIST, CMMC, firewalls, routers, encryption tools). Intermediate networking knowledge of WAN and LAN connectivity, routers, firewalls, switches, security, etc. Experience with Microsoft Intune, Active Directory, Windows, MacOS and ABM, as well as mobile platforms like Android and iOS. Advanced understanding of Microsoft products (Exchange, SharePoint, Windows, Windows Server, Active Directory, etc.). Familiarity with command-line tools (e.g., PowerShell, Terminal) for troubleshooting and deployment. Strong troubleshooting skills, particularly related to network security, software issues, and IT environments. Excellent verbal and written communication skills; ability to explain complex topics to both technical and non-technical audiences. Applicants must have strong emotional intelligence to intuit and match customer sentiment for effective communication. Preferred Skills Prior experience with NIST 800-171, CMMC, or other compliance standards. Ability to manage multiple customer accounts and onboarding projects simultaneously. Familiarity with CRM platforms (HubSpot), and compliance documentation tools while managing SLAs which include customer satisfaction, initial response, and issue resolution times.
    $103k-146k yearly est. 3d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Yuma, AZ?

The average cyber security analyst in Yuma, AZ earns between $66,000 and $122,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Yuma, AZ

$90,000
Job type you want
Full Time
Part Time
Internship
Temporary