Acquisition Security Analyst
Information security analyst job in Los Angeles, CA
MANTECH seeks a motivated, career and customer-oriented Acquisition Security Analyst II to join our team in El Segundo, CA.
The Acquisition Security Analyst II will assist the Government Program Manager with the development and implementation of comprehensive program protection methodologies to protect advanced technology programs throughout the system's lifecycle.
Responsibilities include but are not limited to:
In-depth lifecycle program analysis to identify critical program information (CPI), Critical System Resources (CSR), and their associated vulnerabilities. Assist with the identification and implementation of countermeasures. Develop and implement a risk management-based program protection plan and strategy.
Provide security recommendations to the PM, GSSO, and cognizant security authorities as to the Air Force acquisition and sustainment process.
Maintain a working relationship with the PM, Contracting Officer and contractor security officers to ensure a standardized and correct format/process is utilized for all DD Form 254 efforts throughout the acquisition and sustainment lifecycle, in coordination with Program Security Officers.
Conduct analysis of foreign intelligence threats against programs involving customer's critical research, sensitive technologies or CPI.
Prepare and produce analytical products from numerous resources, to include various databases, to ensure a real-time, tailored product is provided.
Write, review, and/or edit Security Classification Guides (SCG), Exposure Contingency Plans (ECP), Managed Access Plans (MAP), Security Operating Procedures (SOPs), System Test Plans (STP)
Provide technical analysis and OPSEC support to SMC or AFSPC Special programs and other associated operations, missions, and organizational elements involved in developing system requirements to associated systems RDT&E.
Minimum Qualifications:
Bachelor's degree in a related area; an additional 4 years of related experience might be considered for a degree.
10+ years of related experience with acquisition programs
6+ years of experience with SCI programs.
Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents.
Must have extensive knowledge of the DD Form 254 and how it is incorporated in the Air Force acquisition process.
Willingness to travel within the scope of the Program's Area of Responsibility (AOR) (note- could be extensive, and will include both air and ground transportation)
Preferred Qualifications:
4+ years of experience with SAR program acquisitions desired.
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision.
Have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners.
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a polygraph.
Physical Requirements:
Must be able to remain in a stationary position 50%.
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
Cyber Security Analyst
Information security analyst job in Irvine, CA
Required Skills & Experience:
Bachelor's degree in a related field preferred but not required.
5+ years of experience in a SOC or similar security environment.
Expertise with SIEM, EDR, CSPM tools; strong skills in SQL/KQL/Cypher for data analysis.
Proven ability to lead complex investigations and coordinate across technical and business stakeholders.
Solid understanding of cybersecurity frameworks (MITRE ATT&CK, NIST CSF, NIST SP800-61r3).
Experience with log aggregation technologies and SIEM tuning processes.
Job Description:
A large financial services customer based in Irvine, CA is seeking a Cyber Security Operations Analyst, focused on Incident Response. This individual will lead Incident Response, and act as a technical expert within the SOC. This team protects the organization from cyber threats. This role requires strong analytical skills, leadership in high-severity incidents, and deep knowledge of security tools and frameworks.
Pay:
50-65/hr
Director of Information and Data Security
Information security analyst job in Santa Clara, CA
Role Purpose
The Director of Information and Data Security will establish and lead Eltropy's IT and cybersecurity function, responsible for developing foundational systems, processes, and governance across infrastructure, data protection, and compliance. This leader will drive security maturity across the organization by balancing hands-on execution with long-term strategic planning, and by partnering with external GRC consultants to build a scalable security and compliance framework aligned with industry standards such as SOC 2 and ISO 27001.
Location: Santa Clara, CA (Hybrid)
Department: IT, Cyber Security and Ops
Employment Type: Full-Time
Minimum Experience: Senior Manager/Supervisor
Compensation: $200,000-$240,000 (Base + Bonus)
Strong cybersecurity background, with experience leading threat detection, incident response, and proactive security risk management across cloud and enterprise environments.
Key Responsibilities
IT and Infrastructure Security
Oversee endpoint management, asset inventory, and identity and access management
(IAM).
Establish standards for device hardening, patch management, and secure configuration.
Define and manage the budget for all security and IT tools, services, and human capital,
ensuring cost-effectiveness and alignment with the overall security roadmap.
Implement centralized visibility and control across systems and SaaS applications.
Cybersecurity and Data Protection
Lead threat detection, vulnerability management, and incident response operations.
Implement and maintain a Cloud Security Posture Management (CSPM) solution to
monitor cloud infrastructure (AWS/Azure) for misconfigurations and compliance issues.
Deploy and tune SIEM/XDR solutions to enhance visibility and threat detection across
environments.
Conduct regular penetration testing, track remediation, and drive security awareness
programs.
Define and enforce data protection policies covering classification, encryption, and
retention.
Governance, Risk, and Compliance (in partnership with GRC Consultant)
Partner with external GRC consultants to design and operationalize Eltropy's information
security and compliance framework.
Translate consultant-driven recommendations into actionable internal controls, policies,
and monitoring mechanisms.
Manage the Third-Party Risk Management (TPRM) program, including vendor due
diligence, security questionnaires, and ongoing risk monitoring.
Maintain a centralized risk register and oversee remediation tracking.
Own operational compliance for frameworks such as SOC 2, ISO 27001, and GDPR.
Security Architecture and Product Collaboration
Work closely with Engineering and Product teams to embed security-by-design principles
in SaaS architecture and cloud deployments.
Implement automated security testing (SAST/DAST) within the CI/CD pipeline to shift
security left and reduce vulnerabilities early in the development lifecycle.
Review architecture and third-party integrations to ensure alignment with data security
and privacy standards.
Incident Management and Business Continuity
Establish and operationalize the company's Incident Response Plan (IRP) and Business
Continuity/Disaster Recovery (BCP/DR) framework.
Conduct tabletop exercises and post-incident reviews to enhance preparedness and
learning.
Security Awareness and Culture
Develop and implement a company-wide security awareness program.
Partner with HR and Operations to ensure onboarding/offboarding includes security
compliance and periodic training.
Foster a security-first culture emphasizing accountability and vigilance across teams.
Leadership and Department Setup
Build and lead a high-performing IT and Security team, including IT administrators and
cybersecurity engineers.
Define structure, roles, and hiring priorities aligned with the company's growth stage.
Create a phased roadmap for security maturity, including technology adoption and process optimization.
Key Performance Indicators (KPIs)
Security Tool Coverage: Achieve at least X% deployment and agent coverage across all
corporate and cloud assets within the first 6 months.
Vulnerability Remediation: Maintain average time-to-remediate critical and high
vulnerabilities below X days.
Compliance Milestones: Achieve SOC 2 / ISO 27001 readiness within agreed timelines.
Asset Visibility: 100% endpoint and asset inventory completeness.
Incident Management: Reduction in mean time to detect (MTTD) and mean time to
respond (MTTR) for incidents.
Team Ramp; Process Setup: Completion of key hires and operational processes within the first
year.
Requirements
Independent, self-starter with strong ownership and execution bias.
Ability to prioritize and execute in a resource-constrained, fast-paced SaaS environment.
Strategic thinker with operational depth; able to balance long-term maturity goals with
immediate risk mitigation.
Excellent communication skills with the ability to influence and align cross-functional
stakeholders.
Proven experience setting up IT or cybersecurity programs in a SaaS or technology
environment.
Strong understanding of endpoint protection, cloud infrastructure security (AWS/Azure),
IAM, and network security.
Experience with SIEM and/or XDR deployment and tuning for threat detection and
monitoring.
Familiarity with CSPM, SAST/DAST, and vulnerability management tools.
Knowledge of GRC frameworks (SOC 2, ISO 27001) and translating them into practical,
auditable controls.
Reporting to:
VP of Operations
Level:
Senior Leadership
Direct Reports:
IT Team
Cybersecurity Engineer(s)
Information Security Manager
Information security analyst job in Santa Clara, CA
Role: Cybersecurity Manager
Duration: 6+ months
Overview: The Cybersecurity Manager leads global cybersecurity operations, incident response, cloud security, and vulnerability management across IT, OT, and cloud environments. This role drives security maturity by overseeing Security Operations (SOC), continuous threat exposure management (CTES), and proactive risk reduction initiatives. The role ensures the organization's security posture aligns with enterprise risk, Zero Trust principles, and regulatory frameworks including ISO 27001, NIST, and ITAR.
Key Responsibilities:Lead cybersecurity operations, including SOC oversight, threat detection, endpoint security, and continuous threat exposure monitoring across identity, endpoint, network, and cloud attack surfaces.
Manage incident response for ransomware, APTs, insider threats, and major security events, leveraging threat intelligence, exposure context, and automation to prioritize response efforts.
Oversee vulnerability, configuration, and exposure management programs using platforms such as Tenable, Automox, and CrowdStrike, ensuring remediation is risk-based and threat-informed.
Strengthen cloud and identity security across Azure, Entra ID, and Microsoft 365, with a focus on reducing attack paths, misconfigurations, and identity-based exposures.
Implement Zero Trust architecture, secure configuration baselines, and attack surface reduction strategies across enterprise environments.
Support compliance efforts aligned with ISO 27001, NIST CSF / 800-53 / 800-171, ITAR, GDPR, HIPAA, and PCI, ensuring CTES practices support audit and risk requirements.
Lead and mentor global cybersecurity teams, contractors, and MSSP partners, ensuring SOC, CTES, and IR functions operate as a unified security program.
Provide executive-level reporting on risk posture, threat exposure trends, incidents, and security metrics, translating technical exposure into business risk.
Requirements:10+ years of cybersecurity experience, including leadership of security operations, SOC, or enterprise security programs.
Strong background in SOC operations, incident response, EDR/XDR, SIEM/SOAR, and continuous threat exposure or attack surface management.
Hands-on experience with tools such as Microsoft Sentinel, XSOAR, CrowdStrike, Defender, and Tenable, with the ability to correlate exposure data, threat intelligence, and detection signals.
Demonstrated experience implementing CTES / CTEM practices, including exposure prioritization, attack path analysis, and proactive risk reduction.
Solid understanding of ISO 27001, NIST frameworks, ITAR, and enterprise regulatory environments.
Strong communication skills with the ability to lead teams, influence stakeholders, and present exposure-driven risk insights to executives.
Cybersecurity risk security analyst
Information security analyst job in Sonoma, CA
We are seeking a Cybersecurity Risk Analyst to support managing and mitigating security risks across processes, technologies, and cloud environments.
The ideal candidate will combine technical expertise, business acumen, and cybersecurity experience to advise partners, assess risks, and drive improvements in secure operations.
This role requires hands on experience with Kusto Query Language (KQL), cloud security, and risk assessment, as well as the ability to communicate effectively with stakeholders at all levels.
Must be local to San Francisco or Los Angeles (LA) or Salt Lake City (SLC).
Responsibilities:
Support risk strategies by identifying and mitigating security risks in bank systems and processes.
Apply and interpret security policies, provide guidance and input on policy enhancements.
Advise business and technical partners on security controls, procedures, and best practices.
Assess cloud and on-prem environments to identify risks and recommend control improvements.
Conduct security control assessments, document findings, and develop actionable remediation plans.
Evaluate third-party vendors to determine shared security responsibilities and associated risks.
Communicate security risks and mitigation strategies effectively to technical teams and executives.
Collaborate across teams to drive secure operations and deliver results in a fast-paced environment.
Qualifications:
Bachelor's degree in Cybersecurity, Information Security, Computer Science, or related technical discipline (or equivalent experience).
3+ years of experience in cybersecurity, information security, or technology risk management.
Proficiency in Kusto Query Language (KQL) for data analysis, log correlation, and threat detection.
In-depth understanding of security frameworks such as NIST, ISO 27001, or FedRAMP.
Demonstrated experience assessing and improving security posture across Cloud (Azure, AWS) and on-premises environments.
Proven ability to conduct security control assessments, identify risk exposures, and develop actionable remediation plans.
Skilled at translating technical security concepts into clear, business-relevant insights for stakeholders and executives.
Excellent communication, collaboration, and interpersonal skills, with a focus on building trusted partnerships across technical and business teams.
Strong organizational and analytical skills, with the ability to manage multiple initiatives in a fast-paced, results-driven environment.
Cyber Security Engineer
Information security analyst job in San Francisco, CA
About the Company
Atomus' mission is to provide world class cybersecurity for the world's most critical organizations. We build security compliance software delivered as managed services sold directly, with relevant professional services and support. Examples of our commercial customers include hypersonic aircraft companies, satellite and space mission systems companies, AI and software companies, among many other companies serving primarily the aerospace and defense industry. At Atomus we are hardworking, we move fast, and we put our customers first.
About the Role
As a Cybersecurity Engineer will work closely with customers to help them implement and fully leverage Atomus' cybersecurity products, maintain compliance with NIST 800-171 and CMMC cybersecurity standards, and solve technical challenges. Our customers depend on Atomus to manage and secure their Windows, MacOS, Ubuntu, iOS, Android devices, and Firewalls while ensuring compliance. We aim to provide the best possible support when they have questions. Our team's main goal is to simplify our customers' lives, for compliance and security. You will serve as the voice of the customer by sharing their feedback and insights with our product team and reporting any issues to our software engineers. We take pride in delivering amazing experiences for our customers.
Responsibilities
Manage and guide new customers through the onboarding process, ensuring proper setup, configuration, and alignment with their security programs and establishing baseline compliance requirements of NIST 800-171 and CMMC while performing technical tasks/project management required for onboardings.
Serve as the first point of contact for technical inquiries, providing debugging, troubleshooting, and solutions for technical IT/security issues related to the Atomus platform.
Work closely with internal teams (sales, product, engineering) along with partners/vendors for customer requirements to communicate customer feedback and advocate for customer needs in product development and rolling out 3rd party products.
Assist customers in managing and maintaining NIST 800-171 and CMMC compliance requirements, ensuring IT documentation is updated and maintained.
Required Skills
Experience in a customer-facing technical role, IT administrator, solutions engineer, Technical Customer Success, or TAM role preferably in cybersecurity or compliance.
Strong experience with cybersecurity frameworks and technologies (e.g., NIST, CMMC, firewalls, routers, encryption tools).
Intermediate networking knowledge of WAN and LAN connectivity, routers, firewalls, switches, security, etc.
Experience with Microsoft Intune, Active Directory, Windows, MacOS and ABM, as well as mobile platforms like Android and iOS.
Advanced understanding of Microsoft products (Exchange, SharePoint, Windows, Windows Server, Active Directory, etc.).
Familiarity with command-line tools (e.g., PowerShell, Terminal) for troubleshooting and deployment.
Strong troubleshooting skills, particularly related to network security, software issues, and IT environments.
Excellent verbal and written communication skills; ability to explain complex topics to both technical and non-technical audiences.
Applicants must have strong emotional intelligence to intuit and match customer sentiment for effective communication.
Preferred Skills
Prior experience with NIST 800-171, CMMC, or other compliance standards.
Ability to manage multiple customer accounts and onboarding projects simultaneously.
Familiarity with CRM platforms (HubSpot), and compliance documentation tools while managing SLAs which include customer satisfaction, initial response, and issue resolution times.
Security Analyst
Information security analyst job in Los Angeles, CA
We are seeking an Information Security Analyst to support enterprise security operations with a focus on vendor risk management, security control integration, and infrastructure security. This role is responsible for conducting security assessments, coordinating the implementation of core security services (including SSO, logging, IAM, and data protection), and supporting compliance activities aligned with frameworks such as NIST and ISO 27001. The ideal candidate has experience in cybersecurity risk management, cloud environments (AWS/Azure), and collaborating with technical teams to ensure the effective delivery of security controls.
At least 2+ years of experience in the following:
Security & Compliance Frameworks
NIST CSF
ISO 27001
CIS Controls
ITIL
SOC 2
PCI DSS
FedRAMP
GDPR / CCPA
Vendor Risk & GRC Tools
OneTrust
SIG (Standardized Information Gathering)
Other GRC/TPRM platforms
Identity, SSO & Access Management
SSO (PingFederate, SAML)
Active Directory
Azure AD
AWS IAM
Information Systems Security Manager (ISSM)
Information security analyst job in Torrance, CA
Castelion is bringing a new approach to defense development and production: one that focuses on short, iterative design cycles, rapid testing in development, and modern commercial manufacturing strategies for production at scale. We're designing, building, and testing next generation long range strike weapons systems to give America and its Allies a definitive edge and deter future conflicts.
Information Systems Security Manager (ISSM)
*This position requires a TS/SCI Clearance and Special Access Program Experience*
Castelion Corporation is looking for an experienced ISSM to manage and maintain the Classified Networks out of our Torrance location. The ideal candidate will be a dedicated security professional with a demonstrated ability to work independently and as a member of a team in a fast-paced, high-tech environment.
The ISSM's primary function serves as a principal expert and manager on all matters, technical and otherwise, involving the security of information systems under his/her purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, NAVY, Army, DARPA, etc. The position will provide "day-to-day" support, oversight, and maintenance for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
As the site ISSM you will own the end-to-end Information Assurance Program for all classified and controlled information systems at our Torrance facility. You will partner with Program Management, Engineering, IT, Security, and the Cognizant Security Agency (DCSA/SAPCO) to obtain and sustain ATO on schedule, mentor a growing ISSO team, and keep our environment audit ready every day.
Responsibilities
Lead RMF/JSIG/DAAPM execution architect secure solutions, prepare authorization packages, brief Security Control Assessments, and drive POA&M closure.
Own continuous monitoring vulnerability & patch management (ACAS/Nessus, SCAP, STIGs), log analysis (Splunk), account management, media control, incident response, and annual self-inspection.
Shape early program decisions embed with PMO to define security requirements, supply secure-by-design input at PDR/CDR/TRR, and influence contract CDRLs.
Develop people & process coach ISSOs/ISSEs, refine SOPs, track metrics, and present status to senior leadership and customers.
Interface with external stakeholders act as the single voice to DCSA, SAPCO, and other Cognizant Security Agencies for all cybersecurity matters.
Develop Assured File Transfer (AFT) in accordance with JSIG
Conduct all self-inspections and report findings to Cognizant Security Agency annually
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning
Maintain a and/or applicable repository for all system authorization documentation and modifications
Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents
Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements
Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed
Assess changes in the system, its environment, and operational needs that could affect the authorization
Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview
Review AIS assessment plans
Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)
Conduct periodic assessments of the security posture of the authorization boundaries
Institute and implement a Configuration Control Board (CCB) charter
Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented.
Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)
Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination
Ensure all authorization documentation is current and accessible to properly authorized individuals
Ensure that system security requirements are addressed during all phases of the system life cycle
Basic Qualifications
A degree in Science, Technology, Engineering or Mathematics (STEM), information technology and a minimum of 5 years of prior relevant experience.
5 years in DoD/IC Cybersecurity as ISSM and must meet position and certification requirements outlined in DoD Directive 8570.01-M for IAM-III within 6 months of the date of hire (CISSP, CISM, GSLC).
Proven delivery of ATO for SAP or SCI systems; prior Enterprise ISSM experience.
Active and transferable U.S. government issued Top Secret SCI (TS/SCI) security clearance required prior to start date.
Finalized CI polygraph, or willingness to submit to one
U.S. citizenship is required
Preferred Skills and Experience
Proven leadership of multi-disciplinary teams and successful ATO delivery for SAP or SCI systems
Expert knowledge of NISPOM (32 CFR 117), JSIG, RMF (NIST 800-37/-53), ICD-503, and DAAPM, oversight/execution of A&A processes.
Experience with DevSecOps pipelines, Zero Trust architecture, and Identity Access Management.
Experience executing DISA STIG/SRG hardening across Linux and Windows.
Background in network/systems security (architecture, topology, protocols, components, principles).
Hands-on with ACAS, SCAP, STIG Viewer, DISA SRGs, and SIEM/Vulnerability Tools SPLUNK, NESSUS etc.
Masters in Cybersecurity, Computer Science, or related engineering field.
CISSP-ISSEP / ISSMP or PMP.
Existing U.S. government issued Top Secret SCI (TS/SCI) security clearance within the last 24 months.
Additional Information
This is not designed to cover or contain all job duties required of the employee. There may be additional activities, duties and/or responsibilities that are required for this position that are not listed in this job description.
All employees are granted long-term stock incentives as part of their employment as Castelion. All employees receive access to comprehensive medical, vision, and dental insurance, and the company offers three weeks of paid time off per year.
Leadership Qualities
Bias to Action and Creative Problem Solving. Desire and experience questioning assumptions in ways that lead to break through ideas that are ultimately implemented. Successfully bring in applicable processes/concepts/materials from other industries to achieve efficiency gains. Ability to personally resolve minor issues in development without requiring significant support.
High Commitment, High Initiative. A successful candidate will have a genuine passion for Castelion's mission and consistently look for ways to contribute to the company's technical goals and prevent hardware blockers. Ability to work in a fast paced, autonomously driven, and demanding atmosphere. Strong sense of accountability and integrity.
Clear Communicator. Proactively communicates blockers. Trusted in previous roles to be voice of company with regulators, suppliers, gate keepers and customers. Capable of tactfully managing relationships with stakeholders to achieve company-desired outcomes without compromising relationships. Emails, IMs and verbal interactions are logical, drive clarity, and detailed enough to eliminate ambiguity.
ITAR Requirements:
· To conform to U.S. Government export regulations, applicant must be a (i) U.S. citizen or national, (ii) U.S. lawful, permanent resident (aka green card holder), (iii) Refugee under 8 U.S.C. § 1157, or (iv) Asylee under 8 U.S.C. § 1158, or be eligible to obtain the required authorizations from the U.S. Department of State.
Employment with Castelion is governed on the basis of competence and qualifications and will not be influenced in any manner by race, color, religion, gender, national origin/ethnicity, veteran status, disability status, age, sexual orientation, gender identity, marital status, mental or physical disability or any other legally protected status.
Senior Security Cloud Engineer - Top VC Firm
Information security analyst job in Menlo Park, CA
Help support the CISO at one of the world's largest venture capital firms, working at the intersection of cloud security, AI and cutting-edge technology.
You'll be joining a lean and highly technical security team, where your impact will be immediate and visible. This role is balanced between seniority and technical depth. You'll be trusted to support and advise the CISO, contribute to strategic decisions and act a senior technical voice, while remaining deeply hands-on as a cloud security engineer.
The environment is heavily cloud based, (primarily Azure, with some AWS) and increasingly focussed on AI platforms and MCP workloads. You'll work closely with AI development, data engineering and platform teams to ensure security is embedded.
Ideally, you'll be coming from a similar role, operating in a senior position while remaining technical day-to-day, with coding in python, terraform or SQL. Whilst this role requires general security experience, you will need to have a background specifically in cloud security.
This role is based in Menlo Park.
Interested in finding out more? No up-to-date resume required.
Security Architect
Information security analyst job in Santa Ana, CA
1. Security, Compliance and Audit Readiness
a. Enforce network security controls aligned with Criminal Justice Information Services (“CJIS”), National Institute of Standards and Technology (“NIST”), and department policy.
b. Implement and maintain firewall rulesets, Network Access Control (“NAC”) solutions (e.g., Cisco Identity Service Engine (“ISE”)), and endpoint access policies.
c. Support the cybersecurity team in incident detection, forensic analysis, and mitigation strategies.
d. Provide documentation and evidence for security audits and compliance reviews.
2. Implementation, Operations and Support
a. Serve as the hands-on engineer for network deployment, upgrades, and incident response.
b. Configure and manage Cisco switches, routers, firewalls, WLCs, and wireless endpoints.
c. Design and manage VPNs, QoS, ACLs, network monitoring, and logging systems (SolarWinds, NetFlow, SNMP).
3. SME Leadership and Staff Development
a. Serve as the department's SME on enterprise security, guiding decisions across IT, public safety systems, and operations.
b. Train, coach, and mentor internal IT staff, including junior and mid-level network technicians.
c. Lead structured knowledge transfer sessions, hands-on training, and real-time coaching during support and implementation activities.
d. Create SOPs, how-to guides, and step-by-step documentation tailored for ongoing use by internal staff.
e. Support staff in preparation for certification paths (e.g., CCNA/CCNP) if desired.
4. Any other activities reasonably related to the foregoing, as assigned by OCSD.
Infrastructure & Security Engineer (Platform)
Information security analyst job in San Francisco, CA
In this role, you will drive the evolution of our infrastructure and security posture. You will have substantial ownership over our technology choices and implementation for deployment, observability, storage, and security. You will identify, triage, and implement incremental improvements in all of these domains, working closely with backend engineers and internal and external auditors to develop appropriately scoped interventions. You will work with engineers to ensure that security considerations are baked into software development from the outset.
You should have a broad understanding of modern best practices around cloud architecture, data governance and infrastructure as code. You should approach questions of infrastructure and security risk with a sense of nuance and good judgment. You should be able to build consensus around your threat models such that the necessary consequences seem natural to other stakeholders.
In this role, you will need to be fluent in Python and Terraform (at least to start).
Company & Funding
We're building the world's largest long-term insurer, using digital money and AI to serve billions of people profitably. We want anyone, anywhere, to be able to save for their future, protect their family, and build wealth across generations.
We face a once-in-a-century opportunity to build a vertically integrated life (re)insurer. Our product offerings are globally unique, making it possible for us to scale our balance sheet, build modern systems from scratch, and then directly compete to win a market that is 3% of global GDP.
We've raised over $140M to date. Sam Altman and Lachy Groom led our initial raise, and they've since been joined by leading investors in AI, insurance, and Bitcoin, including Northwestern Mutual, Apollo, Bain Capital, Pantera, Haun, Framework, Fulgur Ventures, MS&AD, Mouro, Stillmark, and Wences Casares.
Our Bermuda operating subsidiary holds the the world's only license to issue life insurance denominated entirely in Bitcoin. It's also the only company in the world with audited financials stated in Bitcoin. (If you join us, you can expect to do a lot of things no one's ever done before.)
Engineering at Meanwhile
With the advent of ubiquitous AI tooling, the dynamic range in individual engineering effectiveness is only widening.
At Meanwhile, we're planning for a world in which small, tight-knit engineering teams (supported by a small, tight-knit platform team) own entire lines of business, and are compensated accordingly.
We're attacking a huge market with the leanest, most effective team in insurance. Where incumbents employ a thousand people, we think we can make it work with a hundred or a dozen.
We're looking for hungry ICs (and former managers who see the writing on the wall) interested in pushing the boundaries of engineering productivity in a vertically integrated, regulated organization.
We're growing quickly. You will fix million-dollar bugs.
On the business side, we hire for deep domain expertise, ambition, and the creativity to figure out the previously impossible. Because our engineers work closely with people from the business, they need curiosity, flexibility, an appetite for (and the ability to digest) complex context, and strong communication skills.
Our view is that ownership is taken, not given. You will be successful here if your work progressively builds others' trust in your ability to identify, attack, and solve larger and larger problems, including those that no one else has anticipated.
We believe that "code wins arguments," that prototyping is often the best first step in a design process, and that the impact of velocity is non-linear.
You are excited by putting up multiple meaningful changes, or writing thousands of lines of code, in a day (even though you know that deleting lines of code is more exciting than writing them, and that, occasionally, deep reflection is required in order to ship anything).
You aren't fazed by building systems that don't work out - sometimes, you have to throw code away.
Intellectual honesty is non-negotiable. You love to learn and to teach, to ask questions and to answer them, and to be transparent about your uncertainty.
You are eager to learn, with the rest of the team, how to work with AI tools, including agents, in order to move faster and ship better, more complete versions of your ideas. You will experiment with new ways of working, with the expectation that some of them will be unsuccessful, and you will teach others what works.
This is the most exciting time in decades to be a competent, technically ambitious engineer. We want to offer you the opportunity to see what's really possible and how much better you can get at your craft.
Senior Security Architect
Information security analyst job in Santa Ana, CA
Job Title: Senior Security Architect
Contract Duration: 18 Months
Work Schedule: Monday-Friday, 8:00 AM - 5:00 PM
Interview Process: 1 round virtual, possible 2nd round onsite
Employment Type: Contract (C2C)
Work Authorization: U.S. Citizens or Green Card holders only
Role Overview
We are seeking a highly experienced Senior Security Architect to support a confidential law enforcement agency. This is a fully onsite role requiring strong hands-on cybersecurity architecture expertise, leadership capability, and experience working in regulated or government environments. Candidates must be able to successfully complete Live Scan and background checks.
Required Skills & Experience
7-10 years of combined network engineering and cybersecurity experience
Strong hands-on experience with:
Palo Alto Technologies (NGFW, Panorama, Cortex EDR, Cortex XSOAR, Prisma Cloud)
Cisco Networking (Switches, Routers, Firewalls, WLCs, VPNs)
SIEM technologies and security incident response
Cisco ISE, CyberArk, Tenable
AWS and Azure
Microsoft O365 Security Architecture
Azure Entra ID
ServiceNow
Terraform
Experience with:
Firewall consolidation, migrations, and redesigns
VPN deployments (site-to-site, remote access, third-party integrations)
Wireless security (corporate Wi-Fi, BYOD, IOC)
Network monitoring tools (SolarWinds, NetFlow, SNMP)
Proven leadership experience mentoring and guiding technical teams
Compliance & Security Experience
Strong background in CJIS, NIST, NAC, and audit readiness
Experience supporting law enforcement, public safety, federal, or government environments
Ability to pass Live Scan and comprehensive background checks (no exceptions)
Nice-to-Have Qualifications
Advanced CJIS/NIST compliance and audit experience
Experience creating training programs and mentoring staff toward certifications (CCNA/CCNP)
Strong documentation and communication skills
Prior work in enterprise, public safety, or government networks
Senior Security Architect
Information security analyst job in Santa Ana, CA
100% On-site | Santa Ana, CA
We are seeking a Senior Security Architect to lead enterprise security operations, compliance, and infrastructure within a mission-critical environment. This hands-on leadership role combines deep Cisco networking expertise, security architecture design, and staff mentorship to ensure audit readiness and operational excellence.
Key Responsibilities:
• Enforce and maintain network security controls aligned with CJIS, NIST, and internal policy frameworks.
• Implement and manage firewall rules, NAC solutions (e.g., Cisco ISE), and endpoint access policies.
• Support incident detection, forensics, and mitigation efforts alongside cybersecurity teams.
• Lead network deployments, upgrades, and response initiatives across Cisco infrastructure.
• Configure and manage switches, routers, firewalls, WLCs, and VPNs.
• Design and optimize QoS, ACLs, and network monitoring (SolarWinds, NetFlow, SNMP).
• Act as a Subject Matter Expert (SME), mentoring internal IT staff and guiding certification readiness (CCNA/CCNP).
• Create and maintain SOPs, documentation, and training materials for ongoing operations.
Top Skills Required:
• Cisco networking (switches, routers, firewalls, WLCs, VPNs)
• Security & compliance (CJIS, NIST, NAC, audit readiness)
• Network monitoring (SolarWinds, NetFlow, SNMP, ACLs, QoS)
• Leadership & mentoring (staff training, documentation, SME guidance)
Nice-to-Have:
• Advanced CJIS/NIST compliance experience
• Public safety or government network background
• Proven mentorship and SOP development experience
#SecurityArchitect #NetworkSecurity #CiscoJobs #CJIS #NIST #Cybersecurity #SolarWinds #NetworkEngineer #OnsiteJobs #CaliforniaJobs #ITLeadership #InformationSecurity #InfrastructureSecurity
Information Technology Analyst
Information security analyst job in Sacramento, CA
Job Title: IT Analyst
Duration: 36+ months contract
Roles/Responsibilities:
Deliverables:
Help Desk and End-User Support: The IT Consultant shall provide Tier 1 and Tier 2 support to State staff for OIG-HSR IT tools used for the ARS and WCRIS systems. SOW Section 8.1 Current Inventory and Environment describes the OIG HSR's equipment and services for which this support will be needed. These services may include but not be limited to troubleshooting desktops, laptops, mobile devices, peripheral equipment, and other OIG-HSR IT resources, diagnosing and resolving software, hardware, and network connectivity issues, supporting access to State systems and enterprise applications, and assisting users with VPN or remote access. Issues that cannot be resolved at the consultant level shall be escalated to the appropriate State staff or contractor. IT goods and services for which Help Desk and End-User support will be provided are described below in the section OIG-HSR To ensure accountability and transparency, the IT Consultant shall deliver monthly summaries of incidents and service requests, as well as monthly updates to the State's knowledge base of frequently asked questions and support procedures.
Deliverables include:
• Incident/Service Request Logs (monthly summary of tickets opened, resolved, pending)
• User Support Knowledge Base Updates (monthly, updated FAQs and SOPs)
Security and Compliance Support: The IT Consultant shall support the OIG-HSR's development and implementation of information security policies and procedures by:
Identifying information security requirements applicable to the OIG-HSR's ARS and WCRIS systems;
Developing policies and procedures for complying with those requirements.
Training OIG-HSR staff on the information security policies and procedures.
Monitoring and reporting to OIG-HSR leadership regarding compliance with information security policies and procedures
Maintaining documentation demonstrating continuous compliance with requirements
Timely developing and submitting required information technology reports to CDT and other oversight entities.
Applying security patches, ensuring antivirus and endpoint protection measures are operational.
Promptly reporting any identified security incidents in accordance with policy and procedure and supporting mitigation and resolution activities.
Deliverables include:
System Security Plan identifying needed information security policies and procedures and a schedule for developing each.
Information Security Policies and Procedures
Patch & Update Compliance Report (quarterly)
Security Incident Log & Response Report (as needed)
Asset and Inventory Management: The IT Consultant shall assist the State in managing IT equipment and software assets by creating and maintaining accurate inventory records of desktops, laptops, mobile devices, printers, and other technology. The IT Consultant shall support refresh cycles by preparing and deploying new hardware and software, while ensuring retired equipment is properly tracked and removed from the active inventory. Deliverables shall include an annual IT asset inventory report, along with deployment checklists and acceptance forms for each refresh or rollout.
Deliverables include:
IT Asset Inventory
IT Asset Inventory Report (annual, reconciled against OIGHSR records)
Deployment Checklist/Acceptance Form for all new hardware/ software rollouts
Documentation and Knowledge Transfer: The IT Consultant shall capture recurring technical issues, resolutions, and procedures in order to enhance organizational knowledge. In addition, the IT Consultant shall deliver training sessions for State staff on new technologies, processes, or common issues relevant to the ARS and WCRIS systems to strengthen internal capabilities. Documentation shall include updated standard operating procedures reviewed biannually and a comprehensive knowledge transfer package at the conclusion of the engagement to ensure continuity of operations.
Project Participation and Reporting: The IT Consultant shall actively participate in the OIG-HSR's ARS & WCRIS IT Projects. This includes preparing status updates pertaining to assigned project implementation roles, attending meetings, and coordinating with the PM Consultant, CDT, or OIG-HSR staff as needed. This also includes managing maintenance and operations for the two projects, and adhering to, implementing, and updating the Maintenance and Operations Transition Management Plan.
Deliverables include:
Reports as directed by OIG-HSR
Updates as needed to the Maintenance and Operations
Transition Management Plan
Additional IT Support as Needed: The IT Consultant shall provide additional IT support to the OIG-HSR as requested. This support may include identifying, evaluating, procuring, implementing, and maintaining IT goods and services needed to support the ARS and WCRIS systems and providing IT subject matter expertise to support audit and investigative teams.
Regular Status Reports: Present and deliver written and verbal weekly reports that include an overview of:
Completed and upcoming activities
• Status of IT Consultant tasks
• Status of outstanding incident/service request
• Other items as requested by the Project DirectorThe Contractor will deliver these oral reports to the OIG-HSR Project Director.
Attend OIG-HSR staff and management meetings to provide updates on the Projects as directed by the Project Director.
Mandatory Skills:
Key personnel must have a minimum of five (5) years of experience applying analytical processes on IT projects. At least three (3) years of that experience must have been in systems analysis and design.
Key personnel must have a minimum of three (3) years of recent, full-time experience providing IT support services (help desk, desktop, or end-user support) within the last ten (10) years. Key personnel's experience must include troubleshooting and resolving hardware, software, and network connectivity issues in a business or government environment.
Key personnel must have working knowledge of state of California information security requirements, including SIMM 5300.
Key personnel must have a minimum of one (1) year experience supporting California state agencies or departments in developing and implementing information security policies and procedures.
Key personnel must have a CompTIA A+, Network+, Security+, or ITIL certification. A copy of certification must be provided with the offer. The certificate must be active and not expired by the time of offer submission and certification must be maintained during the contract term. Equivalent certifications may be accepted at the State's discretion.
Key personnel must possess a bachelor's degree. Additional qualifying project management experience may be substituted for the required education on a year-for-year basis, up to four (4) years.
Desirable Skills:
More than one (1) year experience supporting California state agencies or departments in developing and implementing information security policies and procedures.
Experience applying analytical and technical skills to assist in implementing business solutions, including some or all of the following tasks:
Documenting an organization's current business process flows
Identifying and documenting functional requirements for information systems
Working with a product manager to define a product approach to meet user needs
Designing, coding and testing functional components of information systems according to
project specifications
Developing project documentation and user training materials according to program specifications
Conducting user training sessions
Senior Backend Engineer - Cloud Security
Information security analyst job in Sunnyvale, CA
About Company,
Droisys is an innovation technology company focused on helping companies accelerate their digital initiatives from strategy and planning through execution. We leverage deep technical expertise, Agile methodologies, and data-driven intelligence to modernize systems of engagement and simplify human/tech interaction.
Amazing things happen when we work in environments where everyone feels a true sense of belonging and when candidates have the requisite skills and opportunities to succeed. At Droisys, we invest in our talent and support career growth, and we are always on the lookout for amazing talent who can contribute to our growth by delivering top results for our clients. Join us to challenge yourself and accomplish work that matters.
We're hiring Senior Backend Engineer - Cloud Security in Sunnyvale, CA
What You Will Do
Build containerized microservices and related components for a multi-tenant, distributed system that ingests and processes real-time cloud events, system telemetry, and network data across major cloud platforms. Your work will enable customers to detect risks and strengthen their cloud security posture.
Mentor junior engineers, interns, and new graduates, helping them develop strong technical skills and become effective contributors.
Write production-quality software primarily in Java using Spring Boot, and work extensively with Kafka, SQL, and other data interfaces.
Work within a Kubernetes-based service infrastructure, while learning new technologies as needed.
Take ownership of major features and subsystems through the entire development lifecycle-requirements, design, implementation, deployment, and customer adoption.
Participate in operational responsibilities, gaining firsthand experience with real-world performance, reliability, and support scenarios-informing how you design and build better systems.
Prioritize quality at every stage, performing thorough developer testing, functional validation, integration checks, and performance testing to ensure highly resilient systems.
Collaborate closely with Product Management to review, refine, and finalize requirements.
Develop a deep understanding of customer needs by engaging with peers, stakeholders, and real-world use cases.
What You Bring
Bachelor's degree in computer science or similar (Master's preferred).
5+ years of experience building scalable, distributed systems.
Passion for software engineering, continuous learning, and working in a collaborative environment.
Hands-on experience with AWS, Azure, or GCP, with strong familiarity at the API/programming level.
Experience with networking and/or security concepts is a plus.
Experience developing containerized services on Kubernetes is strongly desired.
Strong programming experience in Java/Spring Boot or Golang.
Experience building or using REST APIs.
Knowledge of infrastructure-as-code tools such as CloudFormation, Terraform, or Ansible is a plus.
Understanding of TCP/IP networking fundamentals.
Experience developing in Unix/Linux environments.
Droisys is an equal opportunity employer. We do not discriminate based on race, religion, color, national origin, gender, gender expression, sexual orientation, age, marital status, veteran status, disability status or any other characteristic protected by law. Droisys believes in diversity, inclusion, and belonging, and we are committed to fostering a diverse work environment
Staff Blockchain Security Engineer
Information security analyst job in Irvine, CA
About the Company:
Blizzard Entertainment, a global leader in interactive entertainment, has been shaping the world of video games since its founding. Renowned for iconic franchises like
World of Warcraft
,
Overwatch
, and
Diablo
, Blizzard is dedicated to creating immersive, innovative, and high-quality gaming experiences that captivate millions of players worldwide. Our mission is to inspire and connect players through engaging gameplay, compelling storytelling, and vibrant online communities. As we continue to expand our reach in the gaming industry, we remain committed to pushing the boundaries of creativity, technology, and entertainment.
The Role: Staff Blockchain Security Engineer
Blizzard's Application Security (AppSec) team is entrusted with safeguarding the company and its players from software vulnerabilities and security threats. As a Staff Blockchain Security Engineer within AppSec, you will specialize in securing blockchain-based game features, in-game economies, and Web3 integrations. You'll collaborate closely with game development and engineering teams to provide guidance, perform security assessments, and implement best practices throughout the blockchain software lifecycle.
This role requires in-person collaboration two days per week at our Irvine, California headquarters.
Key Responsibilities:
Conduct comprehensive security reviews of blockchain integrations, smart contracts, in-game economy systems, and Web3 features for vulnerabilities and architectural flaws
Advise game development teams on secure blockchain practices and remediation strategies
Establish and maintain secure development processes within the blockchain software lifecycle
Develop, maintain, and improve blockchain-specific security tooling (e.g., fuzzers, static analysis frameworks)
Collaborate with legal, compliance, and risk teams to evaluate security, operational, and regulatory risks of blockchain implementations
Minimum Qualifications:
8+ years in application security, Web3 security, or related disciplines
Proven experience auditing smart contracts, blockchain protocols, or Web3 applications
Expertise in design reviews, threat modeling, secure code review, or penetration testing with a hacker mindset
Strong knowledge of application security principles and common vulnerabilities (e.g., SSRF, race conditions, privilege escalation)
Experience with secure key management, wallet systems, or cryptography
Familiarity with blockchain security tools such as Slither, Echidna, or similar
Scripting or programming experience in Python, C++, JavaScript, or other relevant languages
Ability to balance business goals with security priorities and communicate risks clearly to cross-functional teams
Preferred Qualifications:
Experience in formal verification of smart contracts
Background in blockchain-enabled gaming, DeFi platforms, or NFT ecosystems
Contributions to blockchain security communities, bug bounty programs, or published research
Experience defining and executing long-term blockchain security strategies alongside engineering leadership
Why Blizzard?
Competitive base salary and discretionary annual bonus
Equity opportunities and long-term incentives
Comprehensive health, dental, and vision plans
401(k) with company match
Paid parental leave and flexible time off
A hybrid work model that balances collaboration with flexibility
Salary Range: $170,000 - $250,000. This excludes discretionary bonuses or equity grants, which are determined based on experience, skills, and market standards.
Blizzard Entertainment is committed to building diverse teams that reflect the communities we serve. We are an equal opportunity employer and do not discriminate based on race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or veteran status. If you require accommodation, please reach out to our People Team.
Security Architect GCP
Information security analyst job in Sunnyvale, CA
Security Architect / Implementation Engineer
Duration: 6 Months contract with possibility of extension
We are seeking a highly skilled Security Architect / Security Implementation Engineer with expertise in designing, implementing, and integrating Google Cloud Security Command Center (SCC), Chronicle SIEM, and Cybereason XDR. The candidate will be responsible for architecting the end-to-end solution, implementing GCP native security controls, integrating third-party security tools, and producing detailed design and operational documentation.
Key Responsibilities:
Design and architect cloud-native security controls in GCP aligned with security and compliance frameworks (CIS, ISO 27001, NIST, etc.).
Implement Google Security Command Center (SCC) for threat detection, vulnerability management, and risk insights.
Architect and configure Chronicle SIEM for log ingestion, correlation, and advanced threat analytics.
Integrate Cybereason XDR with SCC, Chronicle, and other security tools to establish end-to-end threat detection and response workflows.
Define use cases, rules, policies, and security playbooks to automate detection and response.
Document the solution architecture, design decisions, configuration standards, and integration workflows.
Conduct knowledge transfer sessions with security operations and support teams.
Collaborate with GCP Cloud Platform teams, SOC teams, and compliance teams to align solutions with enterprise policies.
Required Skills & Experience:
8-12 years of overall IT security experience with at least 4-5 years in Google Cloud Security.
Proven experience with Google Security Command Center (SCC), Chronicle SIEM, and XDR platforms (Cybereason preferred).
Strong knowledge of GCP IAM, VPC Service Controls, Cloud Armor, DLP, Cloud Logging, Cloud Monitoring.
Hands-on experience in integrating SIEM, XDR, and native GCP security tools.
Experience with Terraform, Deployment Manager, or automation frameworks for security deployment.
Strong documentation and presentation skills.
Security certifications preferred: Google Professional Cloud Security Engineer, GCP Professional Architect, CISSP, CISM, CCSP.
Information Security Analyst 1 (On-site Rancho Cucamonga, CA)
Information security analyst job in Rancho Cucamonga, CA
Are you passionate about administrating and enforcing solutions that safeguard data? Are your interested in serving your fellow team and the community? If so, we want to talk to you - we are currently looking for Service Superstars to join our Team!
An Information Security Analyst 1 takes a lead role in the research, design, and implementation of all information security related hardware or software; including operating systems and communications products, coordinating implementations with third party vendors and supporting representatives as needed. This role also serves as a liaison between vendors and other departments on information security related projects.
Duties and Essential Functions:
Service
Personally, provides exceptional member service; uses Service Standards in every work-related interaction.
Ensures that
exceptional
member service is being provided to members and team members, at all times.
Serves as a strong example of leadership in work ethic, professionalism, and conduct.
Promotes a harmonious work environment that motivates others towards team participation, goal setting/accomplishment, and personal development.
Daily Operations
Assists in the management of multiple information security systems, ensuring proper integration of the components with computer systems, network equipment and other devices.
Assists in research of data security needs and requirements for current and future systems.
Performs regular vulnerability analysis for intentional and unintentional systems misuse and identifies appropriate counter measures.
Takes a supporting role in the management of the Credit Union's information security program including establishing, implementing and monitoring of information security, incident response procedures and policies, system configuration standards and ongoing risk assessments.
Assists the credit union management team with the creation, modification, and implementation of Information Security policies and standards.
Performs routine audits of security databases including Active Directory, Anti-Virus, Data Loss Prevention (DLP), Group Policy, Remote Authentication Dial-In User Service (RADIUS), and regularly reviews other security logging systems. Designs and/or implements changes to these systems in response to any discovered vulnerabilities.
Performs regular audits of credit union procedures including new hire/transfer/separation process, configuration checklists, firewall changes, Uniform Resource Locator (URL)/Spam filter changes, DLP changes, file permission changes, inventory changes, equipment changes, and system health checks.
Takes a supporting role in the management of Credit Union patch management, anti-virus, Spam filtering, DLP, URL filtering, and intrusion prevention systems.
Assists with the development and implementation of active directory group policy objects with an emphasis on enhancing computer systems security.
Manages the creation, deletion, or alteration of systems access for Credit Union team members. Makes key decisions on whether to honor system access requests and responds appropriately.
Takes a supporting role in the research, design, and implementation of all information security related hardware or software including operating systems and communications products; assists with coordination of implementations with third party vendors and supports representatives as needed; serves as a liaison between vendors and other departments on information security related projects.
Conducts various training and instruction programs for credit union team members on the secure use of e-mail and the internet as well as operating systems, networking, computer applications and databases.
Assists in the evaluation of new projects and proposes systems for security risks and makes recommendations for implementation to management.
Takes supporting role in analyzing, planning and implementing projects including software, in-house development, hardware, and networks to provide new products and services to members of the credit union and to improve the effectiveness of member data security. Performs capacity planning and tuning of information security systems to assure maximum availability and optimal utilization; directs/assists with hardware and software upgrades as needed.
Develops project scope and timeline documents for individual projects per Information Systems (IS) Department standards.
Stays current with evolving trends in information security related hardware, applications, development, and the internet.
Provides guidance and assistance on technical skills to other IS staff.
Provides regular documentation and reports on the progress of information security initiatives as well as provides suggestions or plans to further improve the credit union's security efforts.
Other duties as deemed necessary and assigned by Supervisor to achieve the goals of the department and the Credit Union.
Benefits Include:
(not a complete list)
Wellbeing
Weekly pay
401K Retirement Savings Plan with company match
Paid time off accrual begins upon hire, 15 paid vacation days, 11 paid holidays
Paid sick leave
Company-provided life insurance at twice your annual salary
Financial Education Programs
DoorDash DashPass
Health
Medical, Dental, and Vision Insurance for part-time and full-time employees
Modern Health
Care.com subscription
Teladoc
Career Development
Career development opportunities
Team members are eligible to apply for assistance with educational expenses through ArrowHeart's scholarship program.
To learn more about Arrowhead Credit Union and our service culture, visit our Career page, and our ArrowHeart Foundation.
The pay range for this position is listed below.
Starting pay for successful applicants is
generally within the minimum to midpoint of the pay range. Our consideration for pay is designed to support career growth and development over time. Offers extended depend on a variety of job-related factors, including but not limited to individual experience, knowledge, training, education, geographic location, market demands, and internal equity.
Pay range:
Minimum: $35.11/hourly
| Midpoint: $43.89/hourly | Maximum: $52.67/hourly
Information Security Analyst
Information security analyst job in Rancho Cucamonga, CA
This position is responsible for ensuring that the Bank's Security operations and preventive controls are managed and maintained in accordance with established Information Security policies, standards and procedures, published regulations and industry best practices.
Primarily responsible for the constant review of vendor security controls in comparison with policies and industry frameworks, risk assessments, determination of control gaps and their remediation.
ESSENTIAL FUNCTIONS
Performs vendor security risk assessments to determine inherent risk on proposed projects and assesses vendor security controls to determine residual risk.
Evaluates the potential exposure to application security risks and threats based on industry security frameworks and recommends appropriate mitigation.
Assesses security practices including Information Security governance, Identity and access control, Incident monitoring and response, Vulnerability assessment and Penetration tests, Network Security and Endpoint Security, among others.
Acts as liaison with Third Party Risk Management, Information Technology and business department Relationship Managers related to vendor risk assessments.
Reports information security risks and follows-up remediations.
Remediates audit and regulatory findings and recommendations related to Information Security and Vendor Risk Management.
QUALIFICATIONS
Education:
College degree in Information Technology or Information Security or equivalent;
Security+, SSCP, CISSP, CISM or similar information security certifications preferred.
Experience:
Minimum two years of experience in Information Security Risk, Information Security Operations or Security Auditing.
Proven experience on third-party risk management and vendor security assessments.
Working knowledge of security practices such as Endpoint Security, Network Security, Security Operations and Security Governance required.
Experience working with Vendor Risk Management (VRM) applications preferred.
Skills/Ability:
Proven ability to initiate and manage projects.
Excellent communication and problem-solving skills.
Strong inter-personal communication and collaboration skills.
Self-starter, highly motivated, and able to work with general supervision.
OTHER DETAILS
$28.84 - $33.65 / hour
Pay determined based on job-related knowledge, skills, experience, and location.
This position may be eligible for a discretionary bonus.
Oracle Cloud IT Functional Analyst II - Fusion OM
Information security analyst job in Diamond Bar, CA
At Niagara, we're looking for Team Members who want to be part of achieving our mission to provide our customers the highest quality most affordable bottled water.
Consider applying here, if you want to:
Work in an entrepreneurial and dynamic environment with a chance to make an impact.
Develop lasting relationships with great people.
Have the opportunity to build a satisfying career.
We offer competitive compensation and benefits packages for our Team Members.
Oracle Cloud IT Functional Analyst II - Fusion OMThe IT Functional Analyst II will work within the IT Team to support the overall system/ network needs of Niagara's corporate office and plants.
Essential Functions
Trouble shooting daily operational system issues to define root cause and define temporary/permanent solutions
Work with the business to understand and gather requirements, document requirements, determine design and approach, configure, and test various applications to deliver and support business needs
Ability to work in fast paced, dynamic environment collaboratively with a cross-functional team and manage minor project implementations
On-going analysis of the supply chain process to identify opportunities for process and system improvements, efficiency gains, and cost reduction through the use of various supply chain applications and data mining tools
Organize, schedule and run meetings to identify supply chain opportunities and system needs
Interacting with multiple departments including but not limited to IT, Accounting, Finance, Transportation, Customer Service, Planning, Distribution, and Production
Documenting meeting minutes, action items, issues, and risks
Gathering requirements, Documenting requirements, process flows, new functionality, and creation of SOP/training materials
Training super and end users on new functionality and process changes
Ability to plan, track, escalate, and deliver upon tasks and timelines assigned
Available for 24/7 support (scheduled and off hours)
Review system design approaches to ensure they fully meet the business requirements
Write use cases, business rules, and other artifacts such as swim lane diagrams and activity flow diagrams to effectively articulate and represent business processes, desired outcomes, and requirements
Produce key documents, both in written and presentation format
Excellent problem solver with the ability to keep many driving factors and requirements in focus
Monitor and improve process and technology and provide insights into overall status
Strong communication and documentation skills, ability to communicate and interact at executive and junior levels
Review system design approaches to ensure they fully meet the business requirements
Write use cases, business rules, and other artifacts such as swim lane diagrams and activity flow diagrams to effectively articulate and represent business processes, desired outcomes, and requirements.
Produce key documents, both in written and presentation format.
Excellent problem solver with the ability to keep many driving factors and requirements in focus
Monitor process and technology and provide insights into overall status
Train business users on new process and functionality
Strong communication and documentation skills, ability to communicate and interact at executive and junior levels
End to end Project Management throughout the project lifecycle: including administration, planning, configuration, testing, training, implementation, support, and change management
Trouble shooting systemic and operational system issues to define root cause and determine temporary/permanent solutions
Work with application vendors to identify/resolve application defects
Work with internal and external stakeholder to identify system enhancements and gaps to design and build a sustainable solution
Guide other IT resources as needed
Proactively identify and address defects/issues independently
Please note this job description is not designed to contain a comprehensive list of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without prior notice.
Additionally, the IT Analyst is expected to demonstrate:
Analyze and develop solutions addressing customer needs
Experience in Business Analysis
Overall high degree of professionalism
Strong team-oriented interpersonal skills including facilitation and the ability to effectively interface and work with a wide variety of people.
Must work independently
Strong analytical, problem-solving skills and critical thinking skills
Ability to translate complex business needs into use case models
Ability to manage multiple priorities and projects
Strong written and verbal communication skills including the ability to provide detail documentation of a technology incident
Proficient computer skills (i.e. Microsoft Office, Outlook)
Excellent interpersonal, communications and analysis skills, planning and organizational proficiency and good business judgment
Ability to delivery effective and professional presentation to peers, management and other professionals within our field
Qualifications
Minimum Qualifications:
4-6 Years - Experience in Oracle ERP Cloud
4-6 Years - Experience managing projects
*experience may include a combination of work experience and education
Preferred Qualifications:
6-8 Years - Experience in Oracle ERP Cloud
6-8 Years - Experience managing projects
*experience may include a combination of work experience and education
Education
Minimum Required:
Bachelor's Degree in Computer Science or Engineering, related field, or equivalent work experience
Preferred (Optimal Candidate):
Master's Degree in Computer Science or Engineering, or related field or equivalent work experience
Typical Compensation Range
Pay Rate Type: Salary$100,464.14 - $145,673.02 / Yearly
Benefits
Our Total Rewards package is thoughtfully designed to support both you and your family:
Regular full-time team members are offered a comprehensive benefits package, while part-time, intern, and seasonal team members are offered a limited benefits package.
Paid Time Off for holidays, sick time, and vacation time
Paid parental and caregiver leaves
Medical, including virtual care options
Dental
Vision
401(k) with company match
Health Savings Account with company match
Flexible Spending Accounts
Expanded mental wellbeing benefits including free counseling sessions for all team members and household family members
Family Building Benefits including enhanced fertility benefits for IVF and fertility preservation plus adoption, surrogacy, and Doula reimbursements
Income protection including Life and AD&D, short and long-term disability, critical illness and an accident plan
Special discount programs including pet plans, pre-paid legal services, identity theft, car rental, airport parking, etc.
Tuition reimbursement, college savings plan and scholarship opportunities
And more!
***********************************************
* *Los Angeles County applicants only** Qualified applicants with arrest or conviction records will be considered for employment in accordance with the Los Angeles County Fair Chance Ordinance for Employers, the California Fair Chance Act, and any other applicable local and state laws.
Any employment agency, person or entity that submits a résumé into this career site or to a hiring manager does so with the understanding that the applicant's résumé will become the property of Niagara Bottling, LLC. Niagara Bottling, LLC will have the right to hire that applicant at its discretion without any fee owed to the submitting employment agency, person or entity.
Employment agencies that have fee agreements with Niagara Bottling, LLC and have been engaged on a search shall submit résumé to the designated Niagara Bottling, LLC recruiter or, upon authorization, submit résumé into this career site to be eligible for placement fees.
Auto-Apply