Information security analyst jobs in Carpinteria, CA - 1,126 jobs
All
Information Security Analyst
Security Engineer
Senior Security Analyst
Information Systems Security Officer
Security System Engineer
Information Security Engineer
Senior Information Security Analyst
Information Technology Analyst
Securities Analyst
Information Security Officer
Information Security Manager
Senior Security Engineer
Manager, Information Assurance
Acquisition Security Analyst
Mantech 4.5
Information security analyst job in Los Angeles, CA
MANTECH seeks a motivated, career and customer-oriented Acquisition SecurityAnalyst II to join our team in El Segundo, CA.
The Acquisition SecurityAnalyst II will assist the Government Program Manager with the development and implementation of comprehensive program protection methodologies to protect advanced technology programs throughout the system's lifecycle.
Responsibilities include but are not limited to:
In-depth lifecycle program analysis to identify critical program information (CPI), Critical System Resources (CSR), and their associated vulnerabilities. Assist with the identification and implementation of countermeasures. Develop and implement a risk management-based program protection plan and strategy.
Provide security recommendations to the PM, GSSO, and cognizant security authorities as to the Air Force acquisition and sustainment process.
Maintain a working relationship with the PM, Contracting Officer and contractor security officers to ensure a standardized and correct format/process is utilized for all DD Form 254 efforts throughout the acquisition and sustainment lifecycle, in coordination with Program Security Officers.
Conduct analysis of foreign intelligence threats against programs involving customer's critical research, sensitive technologies or CPI.
Prepare and produce analytical products from numerous resources, to include various databases, to ensure a real-time, tailored product is provided.
Write, review, and/or edit Security Classification Guides (SCG), Exposure Contingency Plans (ECP), Managed Access Plans (MAP), Security Operating Procedures (SOPs), System Test Plans (STP)
Provide technical analysis and OPSEC support to SMC or AFSPC Special programs and other associated operations, missions, and organizational elements involved in developing system requirements to associated systems RDT&E.
Minimum Qualifications:
Bachelor's degree in a related area; an additional 4 years of related experience might be considered for a degree.
10+ years of related experience with acquisition programs
6+ years of experience with SCI programs.
Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents.
Must have extensive knowledge of the DD Form 254 and how it is incorporated in the Air Force acquisition process.
Willingness to travel within the scope of the Program's Area of Responsibility (AOR) (note- could be extensive, and will include both air and ground transportation)
Preferred Qualifications:
4+ years of experience with SAR program acquisitions desired.
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision.
Have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners.
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a polygraph.
Physical Requirements:
Must be able to remain in a stationary position 50%.
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
$67k-89k yearly est. 3d ago
Looking for a job?
Let Zippia find it for you.
Manager, Security Services - Apple Information Security
Apple Inc. 4.8
Information security analyst job in Sunnyvale, CA
Sunnyvale, California, United States Corporate Functions
Imagine what you could do here. At Apple, new ideas have a way of becoming extraordinary products, services, and customer experiences very quickly. Bring passion and dedication to your job and there's no telling what you could accomplish. We're a diverse collection of problem solvers and doers, continually reimagining our products, systems, and practices to help people do what they love in new ways. This is a deeply reciprocal place, where everything we build is the result of people in different roles and teams working together to make each other's ideas stronger. That same real passion for innovation that goes into our products also applies to our practices, strengthening our dedication to leave the world better than we found it!
We are seeking a leader for our Security Services team. This role requires a strategic, results-driven leader to advance our security services portfolio while ensuring delivery excellence, operational efficiency, and exceptional customer outcomes. In this role, you will drive the evolution, optimization, and continuous improvement of security offerings, aligning capabilities with business objectives and emerging security needs. The ideal candidate brings a strong blend of security or technical expertise, proven people leadership, and a customer-centric mindset.
Description
The Manager, Security Services will be responsible for influencing and driving transformational change across the organization. This is an opportunity to play a key role in shaping the future of our security service offerings. You must be passionate about service excellence and continuous improvement.
Responsibilities
Service Catalog Management: Develop and maintain a comprehensive service catalog that clearly defines and describes all available services, ensuring alignment with business objectives, customer and security needs.
Service Standards Design: Establish and implement service standards that ensure consistent quality and performance across all service offerings.
Maturity Assessments & Roadmaps: Conduct maturity assessments to evaluate current service capabilities and develop strategic roadmaps for continuous improvement.
Performance Metrics Establishment: Work across teams to monitor key performance indicators (KPIs) to assess service effectiveness, efficiency, and customer satisfaction.
Minimum Qualifications
Demonstrated ability to manage, lead, and inspire teams while driving transformational organizational change
Expertise with service delivery management; overseeing the end-to-end delivery of managed services
Experience leading teams in a matrixed environment including working with security engineering, engineering managers, software developers, and other cross-functional teams
Strong problem solving skills; with the ability to lead through ambiguity to deliver incremental value to our customers
Exceptional communication and presentation skills
Preferred Qualifications
Experience in leading an MSP (managed service provider) or MSSP (managed security service provider) organization
Expert knowledge of service management frameworks (e.g. ITIL) and security best practices.
CISSP and related security certifications is a plus
At Apple, base pay is one part of our total compensation package and is determined within a range. This provides the opportunity to progress as you grow and develop within a role. The base pay range for this role is between $208,400 and $313,500, and your base pay will depend on your skills, qualifications, experience, and location.
Apple employees also have the opportunity to become an Apple shareholder through participation in Apple's discretionary employee stock programs. Apple employees are eligible for discretionary restricted stock unit awards, and can purchase Apple stock at a discount if voluntarily participating in Apple's Employee Stock Purchase Plan. You'll also receive benefits including: Comprehensive medical and dental coverage, retirement benefits, a range of discounted products and free services, and for formal education related to advancing your career at Apple, reimbursement for certain educational expenses - including tuition. Additionally, this role might be eligible for discretionary bonuses or commission payments as well as relocation. Learn more about Apple Benefits.
Note: Apple benefit, compensation and employee stock programs are subject to eligibility requirements and other terms of the applicable plan or program.
Apple is an equal opportunity employer that is committed to inclusion and diversity. We seek to promote equal opportunity for all applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, Veteran status, or other legally protected characteristics. Learn more about your EEO rights as an applicant.
Apple accepts applications to this posting on an ongoing basis.
#J-18808-Ljbffr
$208.4k-313.5k yearly 2d ago
Industrial Security Analyst
Northrop Grumman 4.7
Information security analyst job in Chula Vista, CA
At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
Northrop Grumman Mission Systems is seeking an Industrial SecurityAnalyst to develop, and administer security programs and procedures for classified or proprietary materials, documents, and equipment. Studies and implements federal security regulations that apply to company operations. Obtains rulings, interpretations, and acceptable deviations for compliance with regulations from government agencies. Prepares manuals outlining regulations, and establishes procedures for handling, storing, and keeping records, and for granting personnel and visitors access to restricted records and materials. Conducts security education classes and security audits. Investigates security violations and prepares reports specifying preventive action to be taken.
Basic Qualifications:
2+ years of Industrial Security experience or relevant experience with bachelors' Degree; an additional 4 years of applicable work experience may be substituted.
Current Active Secret clearance with ability to meet enhanced security requirements and obtain/maintain SAP eligibility and access.
In-scope investigation (T5, T5R, SSBI, SBPR, PPR) completed within last 6 years or current enrollment in Continuous Evaluation (CE) program.
US Citizenship required.
Excellent oral and written communication skills.
Knowledge of: DODM 5205.07 V1-4 and DISS, JADE, and/or SIMS.
Must be proficient in MS Office suite (Word, SharePoint, PowerPoint, Excel, Outlook, TEAMs).
Preferred Qualifications:
Top Secret clearance.
ICD 705 Tech Spec.
Experience with government networks CV2, CORE, JADE, etc.
Classification review experience.
Experience completing compliance self-inspections and supporting formal customer compliance inspections.
Excellent customer service and communication skills.
Ability to work in a team environment and follow projects through to completion.
Ability to maintain flexibility to deal with changing priorities and deadlines.
Willing to work extended hours, in a fast paced, deadline driven environment, excellent communication skills speaking, writing skills and organized skills enabling effective communications.
Strong working knowledge of basic office automation tool suites such as MS Office (Word, Excel, PowerPoint).
Primary Level Salary Range: $73,900.00 - $110,900.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
$73.9k-110.9k yearly 1d ago
Digital Assurance Manager: IT Controls & Cyber Governance
Price Waterhouse Coopers 4.5
Information security analyst job in San Francisco, CA
A major consulting firm in San Francisco is seeking a Manager in Digital Assurance. You will lead client projects related to IT controls auditing and consulting while mentoring junior staff. Candidates should possess a Bachelor's degree and CPA or CISA certification, along with 5 years of relevant experience. This role emphasizes leadership and quality assurance within innovative contexts. The compensation ranges from $99,000 to $252,450, with eligibility for annual bonuses and comprehensive benefits.
#J-18808-Ljbffr
$99k-252.5k yearly 2d ago
Senior Security GRC Analyst
Lambda Inc. 4.2
Information security analyst job in San Francisco, CA
Lambda, The Superintelligence Cloud, is a leader in AI cloud infrastructure serving tens of thousands of customers. Our customers range from AI researchers to enterprises and hyperscalers. Lambda's mission is to make compute as ubiquitous as electricity and give everyone the power of superintelligence. One person, one GPU.
If you'd like to build the world's best AI cloud, join us.
Note: This position requires presence in our San Francisco or San Jose office location 4 days per week; Lambda's designated work from home day is currently Tuesday.
What You'll Do
Validate and verify the organization's security controls and practices meet the requirements of ISO 27001, 27701, PCI, SOC 2 and other relevant regulatory requirements to ensure alignment to business objectives
Manage IT Risk Register including risk identification, tracking, and prioritization.
Assist with and drive remediation of control deficiencies and gaps
Provide guidance to Control Owners in the planning, design, implementation, operation, maintenance & remediation of control activities and other supporting requirements (e.g. policies, standards, processes, system configurations, etc.)
Communicate with technical and non-technical stakeholders and leaders on cybersecurity risk and controls management topics and program-specific reporting
Assist with the Customer Trust program which may include managing customer assessments, and security questionnaires
Assist control owners with root cause analysis and track risk management action plan progress.
Create risk metrics for management regarding informationsecurity control maturity, compliance status, risks, performance and findings
Assist with the third-party risk management assessment process, ensuring consistent enforcement of informationsecurity requirements
You
Have a minimum of 8 years of experience supporting cybersecurity risk or controls management programs with in-depth knowledge and experience of cybersecurity frameworks including ISO 27001 and 27701, PCI-DSS, SOC, NIST CSF and other regulatory requirements
Have experience managing and running audits, certification programs and control assessments. This includes but is not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, and mapping issues to risks
Have experience collaborating closely with engineers, business teams, and security partners, including incident response, red teams, and architects to seamlessly incorporate cybersecurity controls and risk management processes into their day-to-day operations
Possess a strong ability to define, drive and execute a program vision, strategy, approach and milestones in alignment with organization priorities and initiatives
Nice to Have
Experience in the machine learning or computer hardware industry
Experience with Security by Design and/or Privacy by Design principles
Experience with standard cyber controls frameworks, including CIS Top18, NIST Cyber Security Framework (CSF), NIST 800.53, NIST 800.171, CMMC, Cybersecurity Maturity Model Certification (CMMC), ISO 27001 and 27701, and SOX ITGC control frameworks.
Broad knowledge of IT infrastructure and architecture of computer systems as well as exposure to a variety of platforms such as operating systems, networks, databases, and ERP systems
Familiarity with using third‑party tools such as Audit Board, Whistic, RSA Archer, ServiceNow for third‑party risk management
Certified Information Systems Auditor (CISA)
Certified InformationSecurity Manager (CISM)
Certified Information Systems Security Professional (CISSP)
Certified in Risk and Information Systems Control (CRISC)
Experience in the AI infrastructure, machine learning and/or computer hardware industry
Salary Range Information
The annual salary range for this position has been set based on market data and other factors. However, a salary higher or lower than this range may be appropriate for a candidate whose qualifications differ meaningfully from those listed in the job description.
About Lambda
Founded in 2012, with 500+ employees, and growing fast
Our investors notably include TWG Global, US Innovative Technology Fund (USIT), Andra Capital, SGW, Andrej Karpathy, ARK Invest, Fincadia Advisors, G Squared, In‑Q‑Tel (IQT), KHK & Partners, NVIDIA, Pegatron, Supermicro, Wistron, Wiwynn, Gradient Ventures, Mercato Partners, SVB, 1517, and Crescent Cove
We have research papers accepted at top machine learning and graphics conferences, including NeurIPS, ICCV, SIGGRAPH, and TOG
Our values are publicly available: *************************
We offer generous cash & equity compensation
Health, dental, and vision coverage for you and your dependents
Wellness and commuter stipends for select roles
401k Plan with 2% company match (USA employees)
Flexible paid time off plan that we all actually use
A Final Note:
You do not need to match all of the listed expectations to apply for this position. We are committed to building a team with a variety of backgrounds, experiences, and skills.
Equal Opportunity Employer
Lambda is an Equal Opportunity employer. Applicants are considered without regard to race, color, religion, creed, national origin, age, sex, gender, marital status, sexual orientation and identity, genetic information, veteran status, citizenship, or any other factors prohibited by local, state, or federal law.
#J-18808-Ljbffr
$127k-172k yearly est. 5d ago
Information Security Engineer, Bare Metal
Fluidstack
Information security analyst job in San Francisco, CA
At Fluidstack, we're building the infrastructure for abundant intelligence. We partner with top AI labs, governments, and enterprises - including Mistral, Poolside, Black Forest Labs, Meta, and more - to unlock compute at the speed of light.
We're working with urgency to make AGI a reality. As such, our team is highly motivated and committed to delivering world‑class infrastructure. We treat our customers' outcomes as our own, taking pride in the systems we build and the trust we earn. If you're motivated by purpose, obsessed with excellence, and ready to work very hard to accelerate the future of intelligence, join us in building what's next.
About the Role
The InformationSecurity Engineer, Bare Metal will be a critical part of the infrastructure team, responsible for designing, implementing, and maintaining the security of Fluidstack's bare metal fleet. This role is highly technical and requires deep expertise in hardware, operating systems, and network security in a high-scale, high-performance environment.
Key Responsibilities:
Bare Metal Lifecycle Security: Own the security throughout the entire lifecycle of the bare metal fleet, from provisioning and hardening to decommission.
Image Security and Hardening: Design and implement secure, hardened base operating system images (Linux) for all production and development environments, including automated vulnerability scanning and patch management.
Baseboard Management Controller (BMC) Security: Define and enforce security best practices for BMCs, including access controls, credential management, logging, and firmware integrity/patching.
Network Security: Collaborate with network engineering to design and implement secure network architectures, including micro‑segmentation, intrusion detection/prevention systems (IDS/IPS), and firewall policies for the bare metal environment.
Storage and Data Protection: Implement strong security controls for storage systems, focusing on data‑at‑rest encryption, key management, and secure access protocols for both local and networked storage.
Automation: Develop security automation and tooling (e.g., configuration management scripts) to ensure security is enforced consistently and at scale across the fleet.
Security Monitoring and Incident Response: Configure and manage security monitoring for bare metal infrastructure and participate in the incident response process for critical security events.
Security Review: Conduct regular security audits and threat modeling exercises for new hardware and infrastructure designs.
Focus
Securing and hardening base images (Linux/OS).
Baseboard Management Controller (BMC) access control and firmware security.
Infrastructure network segmentation and policy enforcement.
Storage encryption, data integrity, and key management.
About You
7+ years of experience in an InformationSecurity or Infrastructure Engineering role, with a strong focus on bare metal, IaaS, or high‑scale cloud infrastructure.
Deep practical experience with Linux operating system hardening (e.g., SELinux, AppArmor, kernel‑level security).
Expert‑level knowledge of network security principles, including TCP/IP, VPNs, firewall rulesets, and zero‑trust concepts.
Proven ability to implement and manage encryption technologies, including disk‑level encryption (e.g., LUKS) and hardware‑level encryption.
Strong scripting and automation skills in languages such as Python, Go, or Rust, and experience with configuration management tools (e.g., Ansible, Puppet, Chef).
Understanding of hardware security modules (HSMs) and trusted computing concepts (e.g., TPM/TXT).
Excellent problem‑solving and communication skills, with the ability to work collaboratively across engineering teams.
Nice to Haves
Experience with specific BMC platforms (e.g., OpenBMC, Dell iDRAC, HPE iLO).
Familiarity with compliance standards relevant to bare metal environments (e.g., SOC 2, ISO 27001, FedRAMP).
Experience with hardware‑level root of trust and secure boot implementations.
Relevant security certifications (e.g., CISSP, OSCP, CEH).
Salary & Benefits
Competitive total compensation package (salary + equity).
Retirement or pension plan, in line with local norms.
Health, dental, and vision insurance.
Generous PTO policy, in line with local norms.
The base salary range for this position is $150,000 - $250,000 per year, depending on experience, skills, qualifications, and location. This range represents our good faith estimate of the compensation for this role at the time of posting. Total compensation may also include equity in the form of stock options.
We are committed to pay equity and transparency.
Fluidstack is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Fluidstack will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
.
#J-18808-Ljbffr
$150k-250k yearly 3d ago
Chief Information Security Officer
The Security Executive Council
Information security analyst job in San Francisco, CA
About the job Company
Credit Genie is a mobile‑first financial wellness platform designed to help individuals take control of their financial future. We leverage artificial intelligence to provide personalized insights and are building a financial ecosystem by offering tools and services that provide instant access to cash and building credit. Our goal is to empower every customer to achieve long‑term financial stability.
Founded in 2019 by Ed Harycki, former Swift Capital Founder (acquired by PayPal in 2017). Backed by Khosla Ventures and led by industry pioneers from companies such as PayPal, Square, and Cash App, we are well positioned to build the future of inclusive finance through cutting‑edge technology and customer‑centric solutions.
Overview
As Chief InformationSecurity Officer (CISO), you will be the primary leader responsible for developing and implementing our informationsecurity strategy. You'll protect our systems, data, and customer trust by overseeing cybersecurity operations, ensuring compliance with regulatory standards, and mitigating risks in a dynamic fintech environment. This role demands a visionary leader with deep expertise in cybersecurity, preferably in fintech, and a passion for securing innovative financial products.
What You'll Do
Develop and execute a comprehensive cybersecurity strategy to protect our platform, customer data, and intellectual property.
Ensure compliance with fintech and data privacy regulations, including GDPR, CCPA, PCI‑DSS, and other relevant standards.
Oversee the design, implementation, and monitoring of security controls for payment processing, lending platforms, and other financial products.
Lead incident response, including managing and mitigating cybersecurity breaches, vulnerabilities, and regulatory inquiries.
Collaborate with product, engineering, and compliance teams to embed security‑by‑design principles into new features and services.
Build and maintain a robust security framework for credit and lending operations, ensuring protection against fraud and data breaches.
Conduct risk assessments and implement mitigation strategies for emerging threats in the fintech landscape.
Manage relationships with external security vendors, auditors, and regulatory bodies.
Develop and lead a high‑performing security team, fostering a culture of proactive risk management.
Support international expansion by aligning security practices with global data protection and financial regulations.
Stay ahead of cybersecurity trends, advising the executive team on evolving threats and technologies.
Qualifications Who You Are
Bachelor's or Master's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
10+ years of progressive experience in cybersecurity, with at least 5 years in a senior leadership role at a fintech or high‑growth tech company.
Deep expertise in securing credit and lending platforms, preferably in the fintech industry, with knowledge of fraud prevention, secure payment processing, and regulatory compliance (e.g., Truth in Lending Act, Fair Credit Reporting Act).
Proven track record in designing and implementing security architectures for cloud‑based systems, APIs, and financial applications.
Strong understanding of data privacy, encryption, and consumer protection laws in a fintech context.
Experience leading incident response, penetration testing, and vulnerability management programs.
Exceptional communication skills, with the ability to explain complex security concepts to non‑technical stakeholders, from engineers to board members.
Strategic mindset with the ability to balance security rigor with business innovation in a fast‑paced startup environment.
Nice to have
Experience at a fintech company with exposure to payment processing, lending, or brokerage platforms.
Familiarity with SOC 2, ISO 27001, or other cybersecurity certifications and frameworks.
Knowledge of international cybersecurity regulations to support global operations.
Experience building and scaling security teams in high‑growth environments.
Compensation Benefits And Perks
100% company‑paid medical, dental, and vision coverage for you and your dependents on your first day of employment.
Monthly fitness reimbursement up to $100 or a full membership to LifeTime Fitness.
401(k) with a 2.5% match and immediate vesting.
Meal program for breakfast, lunch, and dinner.
Life and accidental insurance.
Flexible PTO.
We know how to fine‑tune corporate security because we've led effective and efficient Fortune 500‑level security programs. The SEC helps businesses find the best balance of risk mitigation, cost and innovation.
#J-18808-Ljbffr
$142k-209k yearly est. 4d ago
Chief Information Security Officer (0933 Manager V)
Nahse
Information security analyst job in San Francisco, CA
You must apply on our website to be considered for the position. APPLY HERE_> ************************************
The San Francisco Department of Public Health is seeking a dynamic and experienced cybersecurity professional to join its IT leadership team. As a key strategic leader, the Chief InformationSecurity Officer (CISO) (0933 Manager V) will be responsible for developing and executing a comprehensive informationsecurity strategy that safeguards the department's systems, data, and services.
This role leads the implementation of an enterprise-wide security program that promotes collaboration, strengthens governance, and aligns cybersecurity initiatives with organizational goals. The CISO serves as a trusted advisor to senior leadership, providing expert guidance on risk management, security investments, and policy development. The CISO oversees a team of cybersecurity professionals within the SFDPH IT division and collaborates extensively with the CISO for the City and County of San Francisco.
We are looking for a visionary and collaborative leader who can balance innovation with risk mitigation, and who thrives in a complex, mission-driven environment. The CISO reports directly to the Chief Information Officer (CIO).
Essential Job Functions
Provides strategic leadership in evaluating and mitigating informationsecurity threats across the organization using a structured, risk-based methodology. Advises executive leadership on identified risks and ensures timely execution of mitigation and remediation plans with integrity and discretion
Directs the ongoing development of the department's informationsecurity program, including project portfolio management, incident response, policy frameworks, compliance activities, threat and vulnerability management, and third-party risk management
Allocates and manages resources to support a robust security strategy. Identifies and advocates for strategic investments, oversees capital and operating budgets, and delivers ROI analyses and budget recommendations
Partners with the Office of Compliance and Privacy Affairs to assess data security risks related to contracts, projects, artificial intelligence solutions, and other initiatives. Develops tools and interventions to mitigate risks, establishes performance metrics, and monitors compliance through audits and assessments
Builds alignment and support for security goals and initiatives across internal and external stakeholders. Communicates effectively with leadership at all levels on trends, risks, and the overall effectiveness of the security program
Promotes awareness and understanding of regulatory requirements across the organization. Leads or collaborates on testing and auditing activities to ensure ongoing compliance and successful certifications
Analyzes security requirements and ensures compliance with industry standards such as HIPAA, NIST, and PCI-DSS
Establishes and maintains comprehensive policies and procedures to support effective and sustainable security operations
Serves as the department's representative in security-related matters with City agencies and partners
Continuously monitors emerging trends, technologies, and best practices in cybersecurity to ensure the department's security posture remains current and effective
The Chief InformationSecurity Officer (0933 Manager V) may perform other duties as assigned/required.
How to qualify
1. Education: Bachelor's degree from an accredited college or university; AND
2. Experience: Five (5) years of professional healthcare information systems security experience, of which three (3) years must include supervising IT professionals.
Education Substitution: Additional experience as described above may be substituted for the required degree on a year-for-year basis. One (1) year is equivalent to thirty (30) semester units / forty-five (45) quarter units.
Applicants must meet the minimum qualification requirements by the final filing date unless otherwise noted.
One-year full-time employment is equivalent to 2,000 hours (2,000 hours of qualifying work experience is based on a 40-hour work week).
Desirable Qualifications
Possession of a Certified Information Systems Security Professional (CISSP) and/or Certified InformationSecurity Manager (CISM) certification
Verification of Education and Experience
Every application is reviewed to ensure that you meet the minimum qualifications as listed in the job ad. Review SF Careers Employment Applications for considerations taken when reviewing applications.
#J-18808-Ljbffr
$142k-209k yearly est. 5d ago
Senior Cloud Security Engineer - Infrastructure
Klaviyo Inc. 4.2
Information security analyst job in San Francisco, CA
A tech company in San Francisco is seeking a Lead Security Engineer to enhance its security posture across various environments. The ideal candidate will have over 5 years of experience in security roles and expertise in cloud security, IAM, and secure systems design. Responsibilities include implementing scalable security controls and collaborating with cross-functional teams. The base pay range for this position is $220,000 - $330,000 USD.
#J-18808-Ljbffr
$220k-330k yearly 2d ago
Blockchain Systems Engineer - Cross-Chain & Secure APIs
P2P 3.2
Information security analyst job in San Francisco, CA
A blockchain technology company is seeking a Software Engineer in San Francisco to design and build core infrastructure. Responsibilities include developing secure distributed systems and collaborating with teams to enhance blockchain accessibility. The role offers competitive compensation, autonomy in work, and opportunities for international candidates with visa sponsorship. A minimum salary range of $150,000 - $190,000 is provided.
#J-18808-Ljbffr
$150k-190k yearly 4d ago
Senior Security Analyst - Heartflow Heartflow
Isc2 Eastbay Chapter
Information security analyst job in San Francisco, CA
Heartflow is a medical technology company advancing the diagnosis and management of coronary artery disease, the #1 cause of death worldwide, using cutting‑edge technology. The flagship product-an AI‑driven, non‑invasive cardiac test supported by the ACC/AHA Chest Pain Guidelines called the Heartflow FFRCTAnalysis-provides a color‑coded, 3D model of a patient's coronary arteries indicating the impact blockages have on blood flow to the heart. Heartflow is the first AI‑driven non‑invasive integrated heart care solution across the CCTA pathway that helps clinicians identify stenoses in the coronary arteries (RoadMap™Analysis), assess coronary blood flow (FFRCTAnalysis), and characterise and quantify coronary atherosclerosis (Plaque Analysis). Our pipeline of products is growing and so is our team; join us in helping to revolutionise precision heart‑care.
Heartflow is a publicly traded company (HTFL) that has received international recognition for exceptional strides in healthcare innovation, is supported by medical societies around the world, cleared for use in the US, UK, Europe, Japan and Canada, and has been used for more than 500,000 patients worldwide.
Overview
The Heartflow InformationSecurity team is responsible for security across our corporate and product environments, protecting our patient data and medical device ecosystem. We are looking for an investigator that loves the challenge of analysing complex security telemetry to uncover hidden threats and ensure a resilient defence for our corporate and product environments.
The initial focus will be on triaging advanced security events and participating in our security incident response process. Analytical work will span our corporate, clinical and cloud infrastructure and will include threat hunting and the refinement of high‑fidelity detection logic.
What You'll Do
Perform in‑depth analysis of security events, logs, and network traffic using SIEM, EDR, and other security tools to rapidly identify, contain, and remediate complex threats.
Collaborate in developing and implementing custom correlation rules, dashboards, and alerts to enhance detection capabilities.
Drive threat hunts to find “quiet” persistent threats within our clinical and corporate environments.
Participate in continuous refinement of incident response playbooks, operational procedures, and security standards.
Perform security reviews of third‑party vendors to identify risks and ensure they meet company standards.
What You Bring
Education - BS in Computer Science or a related technical degree. No degree? No problem-if you have the equivalent experience and certifications, we want to hear from you.
Experience - At least 2 years in the trenches of a SOC or Incident Response team. However, if you haven't held a formal “Security” title but have at least 2 years on an IT Operations team, we value deep technical expertise in operating systems and networking if you can show us your passion for security.
You're comfortable navigating security platforms like SIEMs, EDR tools (CrowdStrike or similar), and Email Security platforms.
Strong problem‑solving skills with the ability to troubleshoot security issues across networks, operating systems, and applications.
Possess a solid understanding of log correlation and how to write logic for security alerts.
Deep understanding of at least one of the operating system internals (Windows, Linux, or mac OS). Ability to analyse process trees.
Able to analyse network flows and packet data to find hidden threats. You know your way around network tools and can spot anomalies across different types of environments.
What Helps You Stand Out
Certifications: SANS GIAC (GCIH, GCIA), CompTIA (Security+, CySA+), EC‑Council (C|SA) or equivalent.
Proven ability to take initiative- track record of identifying problems and developing solutions independently.
Excellent written and verbal communication skills, with the ability to clearly articulate complex technical issues and remediation plans to both technical and non‑technical audiences.
You are a continuous learner who stays curious about the latest attack trends and loves figuring out how to stop them.
A reasonable estimate of the base salary compensation range is $75,000 to $100,000 per year, and bonus. #LI-IB1
Heartflow is an Equal Opportunity Employer. We are committed to a work environment that supports, inspires, and respects all individuals and do not discriminate against any employee or applicant because of race, color, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression, veteran status, or any other status protected under federal, state, or local law. This policy applies to every aspect of employment at Heartflow, including recruitment, hiring, training, relocation, promotion, and termination.
Positions posted for Heartflow are not intended for or open to third‑party recruiters / agencies. Submission of any unsolicited resumes for these positions will be considered to be free referrals.
Heartflow has become aware of a fraud where unknown entities are posing as Heartflow recruiters in an attempt to obtain personal information from individuals as part of our application or job offer process. Before providing any personal information to outside parties, please verify the following:
A) All legitimate Heartflow recruiter email addresses end with “@heartflow.com” and
B) The position described is found on our careers site at *********************************
#J-18808-Ljbffr
$75k-100k yearly 3d ago
Enterprise IT Engineer - Identity, Security & Cloud
Arena Intelligence
Information security analyst job in San Francisco, CA
A leading tech company in San Francisco is seeking an experienced Enterprise IT Engineer to manage and secure their systems. This role will involve shaping the identity access foundation, administrating SaaS tools, and optimizing workflows. The ideal candidate will have 4-6 years in IT security, deep knowledge of Okta and Google Workspace, and the ability to work effectively in a fast-paced environment. They offer competitive compensation and comprehensive health benefits.
#J-18808-Ljbffr
$111k-158k yearly est. 2d ago
Security Engineer, Operating Systems
Menlo Ventures
Information security analyst job in San Francisco, CA
About Anthropic
Anthropic's mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.
About the Role
We're looking for an Operating Systems Security Engineer to harden and secure the OS layer of our infrastructure. You'll be responsible for designing and implementing OS-level security controls, from kernel hardening to runtime protection, ensuring our systems can withstand sophisticated attacks while maintaining the performance required for AI model training.
This is a hands-on role where you'll work with cutting-edge hardware and implement novel security solutions for environments that don't exist anywhere else in the world. You'll need to balance extreme security requirements with the operational needs of researchers training models at unprecedented scale.
What You'll Do:
Design and implement hardened OS configurations for AI workloads across diverse hardware platforms
Develop kernel security policies using SELinux, AppArmor, and custom Linux Security Modules and runtime enforcement mechanisms
Implement and maintain full-disk encryption solutions for diverse storage systems
Build security infrastructure for AI systems, research environments, and production services
Build secure network stacks with appropriate isolation and segmentation
Create OS-level attestation and integrity monitoring systems
Develop security patches, custom kernel modules, and kernel hardening configurations
Design secure boot processes and trusted execution environments
Work with container teams to ensure proper workload isolation at the kernel level
Design privilege separation and mandatory access control policies
Implement secure update mechanisms for OS components
Build tooling for security configuration management and compliance verification
Who You Are:
5+ years of experience in operating systems security or kernel development
Deep knowledge of Linux internals, including kernel subsystems and security frameworks (SELinux, AppArmor, seccomp, etc.)
Experience with kernel hardening techniques and exploit mitigation
Strong programming skills in C and systems programming languages
Experience with eBPF for security monitoring and enforcement
Understanding of virtualization and containerization security
Track record of identifying and fixing OS-level security vulnerabilities
Experience with security-focused Linux distributions
Strong candidates may also have:
Kernel development experience or contributions to Linux kernel
Experience with real-time or embedded operating systems
Knowledge of hardware security features and their OS integration
Experience with confidential computing and memory encryption technologies (SEV, TDX, SGX)
Background in vulnerability research, exploit development, or fuzzing
Experience with formal methods for OS verification
Knowledge of hardware security features and their OS integration (TPM, HSM, secure enclaves)
Deadline to apply: None. Applications will be reviewed on a rolling basis.
The expected base compensation for this position is below. Our total compensation package for full-time employees includes equity, benefits, and may include incentive compensation.
Annual Salary:$320,000-$405,000 USDLogistics
Education requirements: We require at least a Bachelor's degree in a related field or equivalent experience. Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.
Visa sponsorship: We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.
We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you're interested in this work. We think AI systems like the ones we're building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.
How we're different
We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact - advancing our long-term goals of steerable, trustworthy AI - rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We're an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.
The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI & Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.
Come work with us!
Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. Guidance on Candidates' AI Usage: Learn about our policy for using AI in our application process
#J-18808-Ljbffr
$111k-161k yearly est. 4d ago
Information Security Engineer - Incident & Vulnerability Expert
Unilin 4.6
Information security analyst job in Palo Alto, CA
A leading firm in interior design and construction is seeking an experienced InformationSecurity Engineer to enhance cybersecurity operations and support incident management. The ideal candidate has over 5 years in cybersecurity with expertise in network and endpoint security, complemented by strong analytical skills. This role offers a competitive salary, flexible work environment, and career development opportunities.
#J-18808-Ljbffr
$100k-145k yearly est. 1d ago
Security Engineer: AI/ML Systems & Zero-Trust Defense
Magic 4.6
Information security analyst job in San Francisco, CA
A cutting-edge tech firm located in San Francisco is seeking a Security Engineer to lead the development of security tools and safeguard systems from unauthorized access. The ideal candidate will possess significant experience in security software engineering, demonstrate strong software engineering skills, and be ready for on-call duties. This role offers competitive compensation, including a substantial salary, equity, and comprehensive benefits. Join us to help protect our innovative AI solutions while working within a collaborative and focused environment.
#J-18808-Ljbffr
Information security analyst job in San Francisco, CA
A leading AI research company based in San Francisco is seeking a Client Platform Engineer to secure and enhance endpoint management infrastructure for a variety of devices. You will focus on automating solutions, collaborating with IT and Engineering teams to implement cutting-edge management practices. A strong background in programming and cloud identity providers is required. This role offers opportunities to work with innovative tools in a fast-paced environment.
#J-18808-Ljbffr
$125k-175k yearly est. 3d ago
Security Engineer: Build Trust & Safe AI Systems
Sierra 4.4
Information security analyst job in San Francisco, CA
A leading technology company in San Francisco is seeking a skilled engineer to develop secure systems and contribute to a culture of trust and innovation. You will work on creating security-focused designs for AI systems and enhance data protection. The ideal candidate has experience in software engineering and a strong mindset for security. This role offers a dynamic environment with flexible benefits including unlimited paid time off and comprehensive health coverage.
#J-18808-Ljbffr
$113k-158k yearly est. 1d ago
Product Security Engineer - AI
Crusoe Energy Systems LLC 4.1
Information security analyst job in San Francisco, CA
Crusoe's mission is to accelerate the abundance of energy and intelligence. We're crafting the engine that powers a world where people can create ambitiously with AI - without sacrificing scale, speed, or sustainability.
Be a part of the AI revolution with sustainable technology at Crusoe. Here, you'll drive meaningful innovation, make a tangible impact, and join a team that's setting the pace for responsible, transformative cloud infrastructure.
About This Role
At Crusoe, the AI Security Engineer is central to ensuring the safety, integrity, and resilience of our rapidly evolving AI ecosystem. You will serve as the technical authority on securing Large Language Models (LLMs), AI-powered platforms, and the infrastructure that supports them-driving both strategy and execution for our next generation of secure AI systems.
What You'll Be Working On
AI Security SME & Strategic Partner: Act as the technical leader and SME on the practical security of our AI and LLM ecosystem and define the long‑term technical roadmap for AI security architecture and drive high‑impact cross‑functional initiatives.
LLM Architecture & Design Ownership: Lead the design and implementation of highly secure Generative AI solutions for security applications, focusing on architectural patterns like Retrieval‑Augmented Generation (RAG).
AI‑Powered Tooling & Automation: Architect and implement custom, AI‑powered security tooling that automates threat detection, vulnerability analysis, and data access control, moving from proof‑of‑concept to production at scale.
Secure MLOps & Governance: Establish governance and processes for secure MLOps pipelines. Define standards for model versioning, deployment, and monitoring, ensuring they meet rigorous compliance and security requirements.
Threat Mitigation & Mentorship: Lead threat modeling exercises for novel AI systems. Apply advanced security and privacy best practices, and mentor senior engineers on secure development practices in the GenAI domain.
System‑Level Ownership: Drive the entire lifecycle of critical AI security projects.
What You'll Bring to the Team
3+ years of professional experience building and maintaining production systems, with strong Python programming skills and experience across the stack (backend/frontend).
Deep expertise in advanced Generative AI techniques, including implementing Retrieval‑Augmented Generation (RAG), designing AI Agents and Multi‑step Cognitive Processes (MCP), and building with workflow orchestration frameworks.
Proven ability to own the entire model lifecycle by designing and managing robust MLOps pipelines; experience with containerization (Docker), virtualization (VMs), and cloud platforms (AWS, GCP, Azure) is a plus.
Experience in designing, implementing, and fine‑tuning custom LLMs, coupled with a strong understanding of NLP fundamentals, transformer architectures, PyTorch/TensorFlow, and data structures.
Strong curiosity about security, privacy, and threat modeling; a desire to safely "break" systems to secure them and apply best practices to AI pipelines and deployments.
Strong product sense for rapid iteration and refinement based on data, combined with a collaborative mindset to work closely with engineers, product managers, and securityanalysts in a fast‑paced environment.
Benefits
Industry competitive pay
Restricted Stock Units in a fast growing, well‑funded technology company
Health insurance package options that include HDHP and PPO, vision, and dental for you and your dependents
Employer contributions to HSA accounts
Paid Parental Leave
Paid life insurance, short‑term and long‑term disability
Teladoc
401(k) with a 100% match up to 4% of salary
Generous paid time off and holiday schedule
Cell phone reimbursement
Tuition reimbursement
Subscription to the Calm app
MetLife Legal
Company paid commuter benefit; $300 per month
Compensation
Compensation will be paid in the range of $135,000 - $150,000. Restricted Stock Units are included in all offers. Compensation to be determined by the applicant's education, experience, knowledge, skills, and abilities, as well as internal equity and alignment with market data.
Crusoe is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, disability, genetic information, pregnancy, citizenship, marital status, sex/gender, sexual preference/ orientation, gender identity, age, veteran status, national origin, or any other status protected by law or regulation.
#J-18808-Ljbffr
Information security analyst job in San Francisco, CA
A technology firm in San Francisco is seeking a Corporate Security Engineer to lead initiatives ensuring the safety of its corporate environment. The ideal candidate will have over 4 years of experience in Corporate Security, familiarity with Identity and Access Management, and a strong understanding of security concepts. This role offers hybrid working arrangements and a competitive compensation and benefits package, including mental health support and career coaching.
#J-18808-Ljbffr
$142k-185k yearly est. 3d ago
Information Security Risk Specialist
American Riviera Bank
Information security analyst job in Santa Barbara, CA
About
the
Role:
$93k-137k yearly est. Auto-Apply 5d ago
Learn more about information security analyst jobs
How much does an information security analyst earn in Carpinteria, CA?
The average information security analyst in Carpinteria, CA earns between $78,000 and $162,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.
Average information security analyst salary in Carpinteria, CA