Principal Industrial Security Analyst
Information security analyst job in San Diego, CA
RELOCATION ASSISTANCE: Relocation assistance may be available CLEARANCE TYPE: PolygraphTRAVEL: Yes, 10% of the TimeDescriptionAt Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
Northrop Grumman Mission Systems is seeking a Principal Industrial Security Analyst to support multiple programs under our Communication Solutions business unit as it relates to all applicable classified federal, contractual, customer and company requirements. The responsibilities include, but are not limited to the following: supporting a fast-paced environment; create, maintain and leverage working relationships with internal and external customers. Develops, and administers security programs and procedures for classified or proprietary materials, documents, and equipment.
Experience in program security, with knowledge of implementing a multi-disciplined security program (access control, personnel security, physical security, OPSEC etc.). Studies and implements federal security regulations that apply to company operations. Obtains rulings, interpretations, and acceptable deviations for compliance with regulations from government agencies. Prepares manuals outlining regulations, and establishes procedures for handling, storing, and keeping records, and for granting personnel and visitor's access to restricted records and materials. Conducts security education classes and related briefings. Investigates security violations and prepares reports specifying preventive action to be taken. Working knowledge of DoD 5205.07 SAP Manuals volumes 1-4, ICD 705, ICDs, and/or NISPOM applicable sponsor procedures.
Basic Qualifications:
Current Active TS/SCI Poly clearance.
In-scope investigation (T5, T5R, SSBI, SBPR, PPR) completed within last 6 years or current enrollment in Continuous Evaluation (CE) program +CI Poly
Ability to meet enhanced security requirements and obtain/maintain SAP eligibility and access.
US Citizenship Required.
5+ Years of CPSO, CSSO, or relevant experience with Bachelors; or 3+ Years CPSO, CSSO, or relevant experience with Masters; an additional 4 years of applicable work experience may be substituted for Bachelor's Degree.
Preferred Qualifications:
CDSE Industrial Security Training - FSO for Possessing Facilities, Intro to SAP, SAP Compliance, SAP Mid-Level, etc.
Experience working in Classified Lab and Manufacturing environments is a PLUS
Industrial Security Professional Certifications - SPeD SFPC, NCMS ISP, etc.
Experience with customer high side networks to include CV2, CORE, CNET, JADE, ASCEND, SIC, etc.
OPSEC and Program Protection (P2) experience.
Classification review experience.
Experience completing compliance self-inspections and supporting formal customer compliance inspections.
Experience drafting and completing corrective action plans.
Self-starter with minimal supervision.
Excellent customer service and communication skills.
Ability to work independently and follow projects through to completion.
Ability to maintain flexibility to deal with changing priorities and deadlines.
Strong working knowledge of basic office automation tool suites such as MS Office (Word, Excel, PowerPoint).
Primary Level Salary Range: $91,200.00 - $136,800.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
Auto-ApplyF-35 Information System Security Officer - (Mid-Career)
Information security analyst job in San Diego, CA
What We're Doing: Lockheed Martin's, Rotary & Mission Systems (LM RMS), F-35 Cyber Security invites you to step up to one of today's most daunting challenges: the protection of exquisite government capabilities leading to warfighter supremacy against our peer and near peer adversaries. As a cybersecurity professional at Lockheed Martin, you'll safeguard the sensitive information and warfighting capabilities that our citizens and the world depend upon to protect U.S. and ally interests. Here, you'll work alongside other cybersecurity experts, related departments, and military members to support the military operational objectives by providing them with a safe and secure operating environment. In this fast-paced, real-world environment, you'll draw on all your education and experience as well as the resources of Lockheed Martin to keep these exquisite capabilities protected.
The Work:
This Information System Security Officer (ISSO) position will support the Information System Security Manager (ISSM) in developing, maintaining and overseeing the cybersecurity of assigned classified and/or unclassified F-35 systems at MCAS Miramar. Typical ISSO responsibilities include but are not limited to:
Ensuring required cybersecurity controls are implemented and validated, to include continuous monitoring actions for assigned systems.
Supporting the development and maintenance of cybersecurity related plans and procedures.
Monitoring for non-compliance, anomalous activity (i.e., threats), and effectively reporting such activity and associated risks.
Ensuring POA&Ms or remediation plans are in place for vulnerabilities identified during monitoring activity, audits, inspections, etc. and implementing, or overseeing, corrective actions.
Creating, collecting and retaining data to meet reporting requirements.
Monitoring and correlating data (i.e., events) from a variety of sources (e.g., Splunk, ELA, ePO, ACAS, etc.) to identify and mitigate threats, vulnerabilities and non-compliance.
Investigating, analyzing and responding to cyber events, incidents and non-compliance, including trend analysis, creating detailed written reports and briefing the appropriate parties.
Identifying, implementing and enforcing requirements for the proper handling and storage of Government data and electronic media.
Conducting self-inspections and preparing for customer inspections.
Interacting professionally during the enforcement of security policy and procedures.
Assigned systems may vary in classification, capabilities and complexity. Mission requirements may require other than first-shift work and additional responsibilities as assigned.
Who we are:
Lockheed Martin is a Cyber Security pioneer, partner, innovator and builder. In support of our many customers, the amazing members of our team are responsible for providing all aspects of cybersecurity support in a complex environment. In a rapidly growing enterprise, this role offers the opportunity to grow and hone the unique skills and experiences required as a cybersecurity expert to create, design and build solutions to some of the world's hardest engineering problems.
Why Join Us:
Your Health, Your Wealth, Your Life
With our employees as our top priority, we provide diverse career opportunities designed to propel development and boost agility. Our flexible schedules, competitive pay and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. At Lockheed Martin, we place an emphasis on empowering our employees by fostering innovation. We believe that by applying the highest standards of business ethics and visionary thinking, everything is within our reach - and yours as a Lockheed Martin employee. Lockheed Martin values your skills, training and education. Come and experience your future!
Final Transferable Secret security clearance; last Periodic Reinvestigation must be within the last five (5) years or enrollment in Continuous Vetting program.
Ability to obtain and maintain Special Access Program (SAP) access.
Possess a valid certification that meets or exceeds DoD 8570.01-M IAT II requirements.
Meets: CCNA-Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP
Exceeds: CASP+ CE, CCNP Security, CISA, CISSP (or Assc), GCED, GCIH, CCSP
Prior experience in a cyber workforce role, as categorized by the NICE or DoD workforce frameworks.
Prior experience as an ISSO, ISSM or related DoD Cyber Workforce Role on one or more F-35 information systems.
Prior experience ensuring compliance with applicable laws, regulations, guidance and policies as they relate to DoD cybersecurity and SAPs (e.g., DoDI 8510.01, JSIG, DoDM 5205.07, NIST SP 800 series).
Prior experience with the system authorization process, associated artifacts and their requirements (e.g., SSP, SCTM, Security CONOPs, SOPs).
Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics.
The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration.
*
At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work.
With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility.
If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications.
Other Important Information
By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Ability to work remotely
Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility.
Work Schedule Information
Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.
Security Clearance Information
This position requires a government security clearance, you must be a US Citizen for consideration.
Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $93,200 - $164,450. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer.
Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays.
(Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year.
This position is incentive plan eligible.
Pay Rate: The annual base salary range for this position in most major metropolitan areas in California, Massachusetts, and New York is $107,300 - $185,840. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer.
Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays.
This position is incentive plan eligible.
Cyber security Operations Analyst
Information security analyst job in San Diego, CA
Duties and Responsibilities
Maintain and operate cybersecurity technology and and provide expertise in area of focus (e.g. Risk Assessments, Controls Engineering or Incident Response).
Collaborates with the business to understand their needs in order to tailor security offerings unique to their environment.
Uses working knowledge of IT system functionality, architecture and capabilities to effectively diagnose and troubleshoot issues with some assistance.
Conducts competitive analyses on (in-use and alternative) cyber technologies and documents recommendations for our environment.
Provides awareness and guidance within Sempra Infrastructure community on secure business processes, architecture design, and technical controls.
Maintains awareness of evolving cybersecurity threats and best practices for mitigation.
Develops procedures and guidelines for implementing information security systems and practices.
Develops and aggregates metrics to measure, monitor and report on the effectiveness of information security controls and compliance with information security policies.
Performs other duties as assigned (no more than 5% of duties).
Education
Bachelor's degree in Computer Science or other science or technology major or equivalent experience required.
Experience
Minimum of 2-5 years of direct experience within the information security field required.
In-depth experience in at least one cybersecurity discipline required.
Experience with projects of moderately sized security related initiatives to successful completion required.
Demonstrated experience in vendor selection, testing, implementation, and operations of a broad array of security technologies required.
Knowledge, Skills and Abilities
Familiarization with Endpoint protection software such as Trellix and Microsoft Defender.
Familiarization in deploying vulnerability management agents.
Experience deploying logging agents and configurations.
Knowledge of firewalls and security zone.
Experience working in an Operation Technology (OT), ICS / SCADA environment.
Experience with SCADA network protocols.
Experience with OT network monitoring tools (such as but not limited to: Dragos, Cybervision, CyberX).
Ability to take initiative and work independently when needed.
Ability to maintain, upgrade and recommend operational cybersecurity tools.
Ability to work with Cybersecurity OT Engineering to make recommendations for new tools and capabilities.
Ability to work effectively on multiple projects within a team structure and excellent written and oral communication skills.
Licenses and Certifications
Certified Information Systems Security Professional (CISSP) certification, Global Information Security Professional (GISP) certification, Global Information Assurance Certification (GIAC), Certified Information Systems Auditor (CISA), or Certified Internal Auditor (CIA) certificate preferred.
Targeted professional cybersecurity certifications (i.e. forensics and incident response) preferred.
Other Qualifications
Bilingual in English/Spanish preferred.
Information Security Analyst - Journeyman - Secret Cleared
Information security analyst job in San Diego, CA
Perrygo is a small, rapidly growing company; we are passionate about our employees as well as supporting our customers and their mission. We are excited for the opportunity to bring aboard highly motivated and energetic individuals to join our teams. Currently, we are seeking a Information Security Analyst - Secret Cleared. This role supports a Navy customer in San Diego, CA.
Job Description and Responsibilities: Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses
- Implement and monitor information security policies and procedures.
- Conduct vulnerability scans and risk assessments.
- Support RMF documentation and ATO renewals.
- Respond to and document security incidents and audits.
Basic Requirements: 6+ years of experience in information assurance or cybersecurity
Preferred Skills and Experience:
DoD 8570 IAT Level II certification (Security+ CE, CySA+, or equivalent).
Familiarity with NIST, DISA STIGs, and DoD RMF compliance.
Education Requirements: Bachelor's degree in Cybersecurity, Computer Science, or related field.
Security Clearance: Secret(must be a US Citizen)
Telework and Travel: On-Site.
Contract: This position is pending a contract award.
Perrygo Consulting Group, LLC is an Equal Opportunity Employer, for all individuals, including protected veterans and those with disabilities. All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, disability, or veteran status.
Perrygo Consulting Group, LLC participates in E-Verify.
If being a part of a small, growing company while having the opportunity to work on exciting projects with challenging tasks excites you - then please apply today!
Compensation Package - We offer an excellent compensation package with competitive salaries and meaningful benefits, including:
Paid Time Off (PTO)/Sick Leave
11 Paid Holidays
Flexible Work Schedules (offering a healthy work-life balance whenever possible)
Employee Assistance Program (EAP)
Medical, Dental, and Vision
LTD/STD, AD&D, and Life-Employer Paid
Supplemental Life and Accident options
Health Savings Account (HSA) with employer contribution
401K Plan with employer Safe Harbor contribution
Profit Sharing Plan
Information Systems Security Officer
Information security analyst job in Camp Pendleton South, CA
General information Requisition # R64222 Posting Date 11/14/2025 Security Clearance Required TS/SCI Remote Type Onsite Time Type Full time Description & Requirements Shape the future of defense with MANTECH! Join a team dedicated to safeguarding our nation through advanced tech and innovative solutions. Since 1968, we've been a trusted partner to the Department of Defense, delivering cutting-edge projects that make a real impact. Dive into exciting opportunities in Cybersecurity, IT, Data Analytics and more. Propel your career forward and be part of something extraordinary. Your journey starts now-protect and innovate with MANTECH!
MANTECH seeks a motivated, career and customer-oriented Information Systems Security Officer with strengths in Information Systems Security to join our team at Marine Corps Base Camp Pendleton California.
This position will assist Marine Corps Warfighting Laboratory (MCWL) prepare for and maintain the IT infrastructure, IT capabilities and Audio-Visual capabilities to support emerging ICD 705 Sensitive Compartmentalized Information Facilities (SCIFs) and Special Access Control Facilities (SAPFs) through planning, activation and operations.
Responsibilities include but are not limited to:
* Experience in network design, network monitoring, systems development, and knowledge of Information Assurance (IA) policies, directives, and best practices across DoD and Marine Corps.
* Knowledge and experience with organizations within the Marine Corps responsible for facilitating network approvals and connections.
* Work with various Marine Corps, Navy, Joint, and other services to coordinate installs supporting Initial Operating Capability (IOC) and Final Operating Capability (FOC).
* Ability to communicate and provide effective staff coordination across government, Marine Corps, and contractor organizations.
* Support the facility Site Security Manager (SSM)/Special Security Representative (SSR) and Information Systems Security Manager (ISSM) to oversee the secure installations and operations of systems across multiple security domains and in accordance with policies, directives, and best practices.
* Establishes and satisfies complex system-wide information security requirements based upon the analysis of user, policy, regulatory, and resource demands. Supports Marine Corps and other customers at the highest levels in the development and implementation of doctrine and policies.
Minimum Qualifications:
* Bachelor's degree and at least 10 years' experience planning and/or operating IT infrastructure within ICD 705 facilities.
* Experience with network security aspects of installations and operations.
Preferred Qualifications:
* Experience with MS Word, MS Power Point
Clearance Requirements:
* Candidate must have a current/active Top Secret clearance with the ability to obtain and maintain a TS/SCI clearance prior to starting this position.
Physical Requirements:
* Ability to maintain construction security oversight in outdoor environment; walk (with personal protective equipment) to inspect and document delivery of components and assembly/construction of structure.
The projected compensation range for this position is $112,400.00-$186,500.00. There are differentiating factors that can impact a final salary/hourly rate, including, but not limited to, Contract Wage Determination, relevant work experience, skills and competencies that align to the specified role, geographic location (For Remote Opportunities), education and certifications as well as Federal Government Contract Labor categories. In addition, MANTECH invests in its employees beyond just compensation. MANTECH's benefits offerings include, dependent upon position, Health Insurance, Life Insurance, Paid Time Off, Holiday Pay, short-term and long-term Disability, Retirement and Savings, Learning and Development opportunities, wellness programs as well as other optional benefit elections.
MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
Auto-ApplyInformation Security Analyst
Information security analyst job in San Diego, CA
Requirements
Bachelor's degree in Cybersecurity, Computer Science, or related field.
3+ years of experience in information assurance or cybersecurity.
DoD 8570 IAT Level II certification (Security+ CE, CySA+, or equivalent).
Familiarity with NIST, DISA STIGs, and DoD RMF compliance.
Must possess an active Secret Clearance - Required
This contractor and subcontractor shall abide by the requirements of 41 CFR §§ 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on their race, color, religion, sex, sexual orientation, gender identity or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment individuals without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status or disability.
Salary Description $88,000-$102,000
Cyber Security Analyst (MSSP/SOC)
Information security analyst job in San Diego, CA
Hey there, Rockstar! 🚀 We are looking for you!
At Agile IT, we help organizations thrive by making technology simple, secure, and strategic. As a trusted Microsoft partner and CMMC Registered Practitioner Organization (RPO), we specialize in guiding businesses through the complexities of cloud adoption, cybersecurity, and compliance, so they can focus on achieving their mission without being slowed down by IT challenges.
We combine deep technical expertise with a people-first approach to deliver solutions that actually work in the real world. From CMMC compliance and security to cloud migration, collaboration, and ongoing managed services, Agile IT empowers organizations to modernize with confidence and agility.
Why Work at Agile IT?
Impactful Work: Everything you touch helps to keep our nation's secrets secure while also helping our client organizations thrive, making technology a true enabler instead of a roadblock.
Culture of Growth: We're a team of curious learners and problem-solvers, and we invest in developing your expertise through training, certifications, and hands-on experience.
Flexibility & Balance: With a remote-friendly environment and a people-first approach, you get the freedom to do your best work while living your best life.
Collaborative Team: At Agile IT, you're surrounded by passionate professionals who support one another and celebrate success together.
Forward-Thinking Mindset: We stay ahead of industry shifts so our team and our clients are always future-ready.
Joining Agile IT means being part of a company that isn't just adapting to the future of IT-it's shaping it.
Job Description
At Agile IT, supporting CMMC-compliant environments means we don't just fix problems-we prevent them.
As a Security Analyst at Agile IT, you'll play a critical role in safeguarding our clients. You'll monitor and analyze security events, investigate incidents, and collaborate with senior engineers and architects to deliver world-class managed security services. This is an excellent platform to sharpen your analytical and technical skills while protecting clients in today's ever-changing threat landscape. This position is designed to nurture your career growth, providing a pathway into the dynamic and evolving field of cybersecurity operations and defense.
What you do: (major responsibilities)
Monitor and analyze security events across client environments.
Investigate alerts, perform triage, and escalate incidents when needed.
Conduct threat analysis and provide actionable recommendations to reduce risk.
Assist in incident response activities, including root cause analysis and reporting.
Tune and improve detection rules and security use cases to enhance visibility.
Communicate findings clearly to both technical and non-technical stakeholders.
Stay up to date on emerging threats, vulnerabilities, and trends.
Qualifications
What sets you apart: (qualifications-knowledge, skills, and abilities)
2+ years of experience in a SOC/NOC or MSSP in cybersecurity; OR 5+ years of experience in cybersecurity operations role.
Familiarity with SIEM tools (Sentinel, Splunk, QRadar, etc.).
Strong understanding of networking, firewalls, IDS/IPS, and endpoint protection.
Knowledge of security frameworks such as MITRE ATT&CK, NIST, or CIS Controls.
Excellent problem-solving and communication skills.
A collaborative mindset with the ability to work across teams and with customers.
Nice to have skills: (preferred skills or skills that will be expected to learn)
Certifications such as SC-200, Network+, Security+, CySA+, CEH, CISSP, or equivalent.
Experience with Microsoft Security tools (Defender, Sentinel, Purview, Entra).
Exposure to cloud platforms (Microsoft Azure, AWS, Google Cloud).
Familiarity with compliance frameworks (CMMC, NIST 800-171, HIPAA, ISO 27001).
Additional Information
A writing sample will be requested from candidates who are chosen to move forward in the interview process.
THE FINE PRINT:
Compensation and Benefits
*Pay range is $62,400 to $83,200 per year.
Starting pay is generally lower to mid-range; based on experience.
This is a remote, full-time, non-exempt position.
Medical/Dental/Vision/STD/LTD
Remote mental and physical health networks
$200,000 basic life insurance
Voluntary life
401(k) with 3% employer contribution - no vesting period
Combined 18 days PTO increasing with tenure
9 paid holidays
And so much more
*Factors in determining the appropriate compensation for a role include experience, skills, knowledge, abilities, education, licensure and certifications, and other business and organizational needs. The Hiring Pay Scale referenced in the job posting is the budgeted salary or hourly range that Agile IT reasonably expects to pay for this position.
Background checks, pre-employment aptitude, and skills testing are a mandatory part of the recruitment process. All Agile IT employees are provided with laptops and home office equipment. Due to the contractual requirements of our work with government entities, all hires must be US Citizens.
We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. All your information will be kept confidential according to EEO guidelines.
Information Security Engineer III
Information security analyst job in San Diego, CA
Are you looking to make an impactful difference in your work, yourself, and your community? Why settle for just a job when you can land a career? At ICW Group, we are hiring team members who are ready to use their skills, curiosity, and drive to be part of our journey as we strive to transform the insurance carrier space. We're proud to be in business for over 50 years, and its change agents like yourself that will help us continue to deliver our mission to create the best insurance experience possible.
Headquartered in San Diego with regional offices located throughout the United States, ICW Group has been named for ten consecutive years as a Top 50 performing P&C organization offering the stability of a large, profitable and growing company combined with a focus on all things people. It's our team members who make us an employer of choice and the vibrant company we are today. We strive to make both our internal and external communities better everyday! Learn more about why you want to be here!
PURPOSE OF THE JOB
The purpose of this job is to design secure architectures and develop cybersecurity approaches and techniques to evaluate the security of a system or network. This position will assist with strategic initiatives for short and long-term plans to identify and reduce the attack surface across applications and systems. The position exists to monitor and defend ICW Group's technology against potential threats that jeopardize the financial growth and security goals of the Company.
ESSENTIAL DUTIES AND RESPONSIBILITIES
Monitors and protects information assets across hybrid environments.
Monitors data flows and access events across AWS, on-prem, and SaaS platforms using DLP, CASB, SIEM, and AWS-native tools such as Macie, GuardDuty, CloudTrail, and Security Hub.
Detects and investigates data breaches, insider threats, and exfiltration attempts; leads data-centric incident response through containment, analysis, and recovery.
Implements and enforces data classification, labeling, and tagging frameworks integrated with AWS S3, RDS, and enterprise file systems.
Designs and manages encryption and key management solutions using AWS KMS, CloudHSM, and on-premise HSMs to secure data at rest and in transit.
Collaborates with development and DevOps teams to embed data protection into CI/CD pipelines and application code, ensuring secure data handling throughout SDLC.
Conducts forensic reviews and produces actionable reports, metrics, and dashboards highlighting data risks and anomalies across hybrid systems.
Leads complex data protection initiatives and resolves data security risks.
Leads enterprise data security projects, including AWS DLP implementation, sensitive data discovery, structured/unstructured data protection, and automated alerting.
Defines and enforces data governance standards for both AWS and on-prem environments, aligning to ICW's data lifecycle management and retention requirements.
Partners with database, app dev, and analytics teams to integrate encryption, tokenization, and privacy-by-design principles into application workflows.
Designs and maintains role-based and attribute-based access controls (RBAC/ABAC) across AWS Identity and Access Management (IAM), Active Directory, and application layers.
Collaborates with Privacy, Legal, and Compliance to operationalize data protection impact assessments (DPIAs) and retention/deletion automation.
Produces executive and board-level reports detailing data protection maturity, compliance metrics, and emerging risk areas.
Serves as a technical escalation point for AWS data protection incidents, third-party integrations, and complex remediation efforts.
Serves as ICW's senior data security SME and technical advisor.
Provides expert consulting to architecture, engineering, and product teams on AWS-native security services and hybrid data protection models.
Advises leadership on emerging cloud data security trends and recommends architectures that balance scalability with compliance and risk reduction.
Conducts advanced data risk assessments, privacy impact analyses, and forensic reviews to guide remediation and control design.
Defines AWS-aligned compliance strategies supporting NIST CSF, NYDFS 500, GLBA, and state privacy laws.
Evaluates and integrates modern data security solutions such as SASE/CASB platforms, insider risk analytics, and automated data classification tools.
Mentors junior engineers and fosters a data-first security mindset across ICW's engineering organization.
Partners with project management and internal teams to mature hybrid data security.
Implements technical and process controls to continuously improve data protection maturity in AWS and on-prem applications.
Partners with cloud engineering and on-prem development teams to design secure data pipelines, storage, and access control mechanisms.
Contributes to automation and orchestration of data protection activities using AWS Lambda, EventBridge, and native integration APIs.
Leads knowledge sharing on emerging AWS capabilities while ensuring backward compatibility with existing on-prem data flows.
Coaches development and data engineering teams to identify and mitigate data leakage risks during application and infrastructure design.
SUPERVISORY RESPONSIBILITIES
This position has no supervisory responsibility but may mentor and train junior engineers.
EDUCATION AND EXPERIENCE
Bachelor's Degree from four-year college or university required with major or emphasis Engineering, Cybersecurity, Networking, or Computer Science related discipline.
Minimum 8 years of experience working in a security engineering related role designing secure networks, systems and application architectures or equivalent combination of education and experience required.
Minimum 3-5 years of experience in AWS Cloud Security services preferred. Direct experience using advanced technologies such as Intrusion Detection & Prevention Systems (IDS/IPS), Firewalls, SIEM, Antivirus software, Network Packet Analyzers, content filtering, Malware analysis and forensics tools to detect intrusions.
Experience in cyber security role requiring knowledge of data analysis, risk assessment, risk mitigation, investigation methods, incident management concepts and practices, and policy and procedure development.
Experience with AWS Services such as AWS Identity & Access Management, AWS Organizations, AWS Security HuB, Guard Duty, CloudTrail, AWS CloudTrail.
CERTIFICATES, LICENSES, REGISTRATIONS
Certification in GSEC, CISSP, and/or Security+.
AWS Certified Security - Specialty, preferred
KNOWLEDGE AND SKILLS
Knowledge of risk assessment tools, technologies, and methodologies. Knowledge of disaster recovery, computer forensic tools, technologies, and methods.
Knowledge of enterprise security platforms.
Ability to communicate network security issues to peers and management. Ability to read and use the results of mobile code, malicious code, and anti-virus software.
Strong understanding of endpoint security solutions to include File Integrity Monitoring and Data Loss Prevention.
Demonstrated experience as a lead engineer in the design, implementation and support in an enterprise IT environment.
Ability to work with mathematical concepts such as probability and statistical inference.
Ability to apply principles of logical or scientific thinking to a wide range of intellectual and practical problems.
Ability to combine disparate skills and thinking to craft solutions and solve complex operational problems.
Ability to hypothesize on root cause of inefficiencies and then test out probable solutions against those hypotheses.
Ability to read, analyze, and interpret technical journals, financial reports, security analysis reports and other IT related documents.
Ability to respond to common inquiries or complaints from customers, regulatory agencies, or members of the business community.
Must be able to read, write and speak English effectively.
Ability to effectively communicate/present technical information to a non-technical audience.
Ability to cross train and share information with team members.
PHYSICAL REQUIREMENTS
Office environment - no specific or unusual physical or environmental demands and employees are regularly required to sit, walk, stand, talk, and hear. Employees are required to reach with hands and arms; stoop, kneel, crouch, or crawl. Employees must occasionally lift and/or move up to 30 pounds. Employees are required to have visual acuity and be capable of operating and viewing computers and other electronic devices for extended periods of time.
WORK ENVIRONMENT
This position operates in an office environment and requires the frequent use of a computer, telephone, copier, and other standard office equipment.
We are currently not offering employment sponsorship for this opportunity.
#LI-TM1
#LI-HYBRID
The current range for this position is
$121,624.81 - $217,710.99
This range is exclusive of fringe benefits and potential bonuses. If hired at ICW Group, your final base salary compensation will be determined by factors unique to each candidate, including experience, education and the location of the role and considers employees performing substantially similar work.
WHY JOIN ICW GROUP?
• Challenging work and the ability to make a difference
• You will have a voice and feel a sense of belonging
• We offer a competitive benefits package, with generous medical, dental, and vision plans as well as 401K retirement plans and company match
• Bonus potential for all positions
• Paid Time Off with an accrual rate of 5.23 hours per pay period (equal to 17 days per year)
• 11 paid holidays throughout the calendar year
• Want to continue learning? We'll support you 100%
ICW Group is committed to creating a diverse environment and is proud to be an Equal Opportunity Employer. ICW Group will not discriminate against an applicant or employee on the basis of race, color, religion, national origin, ancestry, sex/gender, age, physical or mental disability, military or veteran status, genetic information, sexual orientation, gender identity, gender expression, marital status, or any other characteristic protected by applicable federal, state or local law.
___________________
Job Category
IT
Auto-ApplyCloud Security Analyst
Information security analyst job in San Diego, CA
Saronic Technologies is a leader in revolutionizing defense autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations for the Department of Defense (DoD) through autonomous and intelligent platforms. Saronic Technologies is seeking a Cloud Security Analyst to join our cybersecurity team and strengthen the security of our AWS GovCloud environments. This role directly supports the Cybersecurity Specialist in maintaining and improving DoD Impact Level 5 (IL5) and IL6 cloud readiness for Saronic systems.
The Cloud Security Analyst will focus on analyzing, monitoring, and hardening AWS configurations, managing access and permissions, and ensuring the protection of Controlled Unclassified Information (CUI) across projects that interact with cloud services.Key Responsibilities:
Cloud Security Oversight
Evaluate and continuously monitor AWS GovCloud environments for compliance with FedRAMP High, DoD IL5/IL6, and CUI handling requirements.
Review and validate IAM roles, permissions, and resource configurations to ensure adherence to least privilege principles.
Assess cloud service configurations (e.g., S3, EC2, RDS, CloudTrail, KMS, Config) and recommend security improvements.
Support implementation of baseline configurations and guardrails aligned with DoD and AWS best practices.
Track, report, and follow up on identified security issues or misconfigurations to closure.
Monitoring and Incident Response Support
Monitor cloud environments using AWS Security Hub, GuardDuty,
CloudTrail, and related tools for anomalies or policy violations.
Assist in vulnerability management efforts, including scanning, prioritization, and remediation verification.
Support cloud-related incident response activities by gathering and analyzing logs, indicators, and events.
Maintain situational awareness of evolving cloud security threats and recommend mitigation strategies.
Governance and Continuous Improvement
Assist in preparing and maintaining security documentation, such as policies, procedures, and compliance evidence.
Support audit preparation and control validation for IL5/IL6 accreditation and RMF-related activities.
Identify opportunities to improve processes and automate compliance or monitoring tasks.
Collaborate on initiatives that strengthen AWS security posture and operational efficiency.
Cross-Team Collaboration
Work closely within the Cybersecurity team to execute security initiatives and ensure unified cloud defense.
Collaborate with internal teams including Security, Software and IT to guide and validate secure implementations.
Provide day-to-day support for AWS-related security issues, IAM management, and secure project deployments.
Communicate findings and recommendations effectively to both technical and non-technical stakeholders.
Required Qualifications
1-2 years of relevant experience in Cybersecurity (internships included).
Bachelor's degree or relevant education in Cybersecurity, Computer Science, or related field. Industry experience may substitute educational requirements.
Familiarity with FedRAMP High, DoD IL4+, and CUI data protection frameworks.
Understanding of AWS security resources and security monitoring.
Strong analytical and problem-solving skills for cloud environments.
This role requires the ability to obtain and maintain a security clearance.
Preferred Qualifications:
AWS Certifications: Cloud Practitioner, Security, Solutions Architect, SysOps Administrator and Developer.
Experience working in or securing AWS or AWS GovCloud environments.
SANS GIAC GSEC or similar Cybersecurity certification.
Familiarity with Terraform and reviewing Infrastructure-as-Code (IaC) configurations for security compliance.
Prior IT systems administration or DevOps experience a plus.
Experience in DoD-accredited (IL5/IL6) or FedRAMP High environments.
Knowledge of NIST 800-171, NIST 800-53, and CMMC 2.0 controls.
Knowledge of autonomous, maritime, or defense-related technologies.
Experience supporting security architecture or accreditation efforts for DoD or government cloud systems.
Ability to work cross-functionally and influence secure practices across diverse technical teams.
Physical Demands:
Prolonged periods of sitting and computer work.
Occasional standing and walking within the office.
Manual dexterity to operate computers and office equipment.
Visual acuity to read screens and documents.
Occasional reaching or lifting up to 20 pounds (e.g., equipment or supplies).
Benefits:Medical Insurance: Comprehensive health insurance plans covering a range of services Saronic pays 100% of the premium for employees and 80% for dependents Dental and Vision Insurance: Coverage for routine dental check-ups, orthodontics, and vision care Saronic pays 100% of the premium under the basic plan for employees and 80% for dependents Time Off: Generous PTO and HolidaysParental Leave: Paid maternity and paternity leave to support new parents Competitive Salary: Industry-standard salaries with opportunities for performance-based bonuses Retirement Plan: 401(k) plan Stock Options: Equity options to give employees a stake in the company's success Life and Disability Insurance: Basic life insurance and short- and long-term disability coverage Pet Insurance: Discounted pet insurance options including 24/7 Telehealth helpline Additional Perks: Free lunch benefit and unlimited free drinks and snacks in the office
This role requires access to export-controlled information or items that require “U.S. Person” status. As defined by U.S. law, individuals who are any one of the following are considered to be a “U.S. Person”: (1) U.S. citizens, (2) legal permanent residents (a.k.a. green card holders), and (3) certain protected classes of asylees and refugees, as defined in
8 U.S.C. 1324b(a)(3)
.
Saronic does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.
Auto-ApplySecurity Analyst - CONTRACT
Information security analyst job in San Diego, CA
Select Cyber, an Information Security recruitment specialty firm, seeks to fill the following role for our client:
Information Security Analyst
This position serves as the first point of contact with the client for security issues and the individual will administer information security architecture utilizing a thorough understanding of available technology, tools and techniques.
Responsibilities:
Perform the following functions as individual assignments or as part of a team:
Respond to alerts from various monitoring systems and platforms
Triage potentially malicious events to determine severity of the event
Analyze malicious artifacts obtained from network monitoring with a focus on generation of threat intelligence and service improvement
Communicate and collaborate with the analyst team for situational awareness.
Assisting with the selection, installation and adoption of automated tools that enforce or monitor the compliance with information security policies & procedures.
Communicate threat information with clients accurately and professionally through formal and informal interactions
Apply structured analytical methodologies to maximize threat intelligence growth and service efficacy.
Requirements:
Bachelor's degree in related field.
3-7 years of technical experience supporting enterprise-scale Secure Operations Centers.
Experience working with Websense, Tipping Point, Blue Coat, Trend Micro, Symantec, Cisco IOS, IDS/IPS, anti-virus software, Proofpoint, Vmware, and AWS cloud.
Must be familiar with the current regulatory environment such as Sarbanes-Oxley, GLBA, etc.
Advanced knowledge of the TCP/IP protocol suite, security architecture, and remote access security techniques.
Information Security Analyst - Senior - NAVSEA - US Navy
Information security analyst job in San Diego, CA
The Senior Information Security Analyst provides advanced cybersecurity, system accreditation, and security compliance support for Navy systems maintained by the Naval Sea Logistics Center (NAVSEALOGCEN). This role is responsible for developing, evaluating, and maintaining security controls, preparing accreditation documentation, conducting system assessments, and ensuring platforms across development, test, and production environments meet DoD, DON, and RMF cybersecurity requirements.
The Senior Analyst works closely with Information System Security Officers (ISSOs), system administrators, developers, system engineers, and program leadership to ensure that all NAVSEA systems maintain the highest levels of security readiness and accreditation compliance.
Key Responsibilities
RMF & System Accreditation Support
Prepare, maintain, and update system accreditation documentation in accordance with Navy, DoD, and NIST RMF standards, including:
System Security Plans (SSPs)
Security Assessment Reports (SARs)
Plan of Action & Milestones (POA&M)
Continuous Monitoring artifacts
Risk and vulnerability assessments
Support system owners and ISSOs through all RMF steps, including categorization, control selection, implementation, validation, and authorization.
Security Configuration & Hardening
Evaluate and validate the security configurations of systems and applications across development, test, and production environments.
Apply and maintain security controls, ensuring compliance with:
Navy STIGs and SRGs
DISA Security Technical Implementation Guides
DoD cybersecurity directives
Conduct security configuration scans, review findings, and work with technical teams to implement mitigations.
Security Monitoring & Vulnerability Management
Perform vulnerability assessments, analyze scan results, and verify remediation actions.
Track and document vulnerabilities in accordance with Navy cybersecurity policy.
Support continuous monitoring plans by updating artifacts and maintaining current system configurations.
Technical Security Analysis
Analyze security logs, audit events, and system behaviors to identify possible incidents or policy violations.
Evaluate emerging threats and recommend updates to system configurations or security policies.
Support investigation of cybersecurity incidents and coordinate response actions as required.
Documentation & Reporting
Develop and maintain system cybersecurity documentation, including configuration guides, diagrams, security test results, and accreditation evidence.
Provide inputs for monthly technical reports outlining system status, significant risks, and security updates.
Support engineering reviews, technical briefings, and audit readiness activities.
Collaboration & Stakeholder Engagement
Work closely with developers, system engineers, database administrators, and network teams to ensure all system changes incorporate required security controls.
Collaborate with program leadership to align system security postures with mission priorities.
Participate in Agile development cycles, change management reviews, and CDRs as required.
Requirements Minimum Education & Experience Requirements
Bachelor's degree or higher in Computer Science, Cybersecurity, Information Systems, Information Technology, or related field.
Minimum of seven (7) years of experience in an IT or cybersecurity role that includes:
Preparing DoD/Navy system accreditation documentation
Evaluating and validating system security configurations
Applying, configuring, and maintaining security controls across multiple environments
Supporting secure configuration management and compliance activities
Security Clearance Requirements
Must hold an Active Secret Security Clearance.
Salary Description 120,000 - 160,000
Information Security Analyst - Senior - NAVSEA - US Navy
Information security analyst job in San Diego, CA
Requirements Minimum Education & Experience Requirements
Bachelor's degree or higher in Computer Science, Cybersecurity, Information Systems, Information Technology, or related field.
Minimum of seven (7) years of experience in an IT or cybersecurity role that includes:
Preparing DoD/Navy system accreditation documentation
Evaluating and validating system security configurations
Applying, configuring, and maintaining security controls across multiple environments
Supporting secure configuration management and compliance activities
Security Clearance Requirements
Must hold an Active Secret Security Clearance.
Salary Description 120,000 - 160,000
Director of Information Security
Information security analyst job in San Diego, CA
This position requires active U.S. national security clearance and/or the ability to obtain one. To learn more about the security clearance process please access this link:
*******************************************************************************************
Additionally, travel may be required to customer and subcontractor sites as well as other office locations.
This position is with Forward Slope, Inc. an Accelint company. Accelint is dedicated to delivering mission-critical technology and defense solutions that accelerate innovation, readiness, and national security outcomes.
Company Summary:
Are you looking to grow your career with a company that values innovation, collaboration, and work-life balance? Forward Slope is a fast-growing, global engineering firm with over 22 years of excellence in the Department of Defense (DoD) industry. We are proud to offer outstanding benefits, a supportive team culture, and opportunities for both educational and professional development. If you are ready to contribute to meaningful work in a fast-paced environment and be part of a company that truly invests in its people, Forward Slope wants you on our team.
Job Description:
Forward Slope (FSI) currently has an opening for a Director of Information Security to join our team. This position is located in San Diego, California.
The Director of Information Security is a hands-on leadership role responsible for the design, implementation, and continuous improvement of our cybersecurity program. This role combines strategic leadership, operational execution, and direct technical work. The ideal candidate will be an experienced security practitioner who is equally comfortable implementing organizational vision and configuring a firewall, drafting policies and responding to incidents, and communicating risks to executives and regulators. Above all, the candidate must be able to lead, grow and inspire the cybersecurity team.
Duties and Responsibilities:
Cybersecurity Strategy and Program Leadership
Work closely with the CISO to evolve the company's cybersecurity strategy and align it with business objectives, regulatory requirements, and threat intelligence.
Define and track security metrics, KPIs, and KRIs to measure program effectiveness and maturity.
Risk Management and Compliance
Lead the company's efforts to maintain compliance with DFARS, CMMC (Levels 2 and 3), NIST SP 800-171, NIST SP 800-53, and ITAR/EAR regulations.
Conduct risk assessments across business units, IT infrastructure, and vendors; develop actionable mitigation plans.
Prepare the organization for cybersecurity audits and assessments, including CMMC certification.
Technical Security Operations
Evaluate, implement, configure and operate critical security technologies and controls including:
Firewalls, endpoint protection, SIEM, vulnerability scanning, DLP, encryption technologies, IAM/MFA.
Perform vulnerability management, threat hunting, and forensic investigations where necessary.
Develop and manage the company's Incident Response playbooks and lead and execute all incident response activities.
Policy Development, Training, and Awareness
Create, maintain, and enforce security policies, standards, procedures, and guidelines.
Build a strong security awareness culture through ongoing education, attack simulations, and training.
Coordinate security onboarding and annual training programs to ensure all employees meet compliance requirements.
Team Building and Leadership
Build and lead a small, high-performing security team of engineers and analysts.
Mentor and develop internal talent, providing clear career progression opportunities.
Partner with IT, software engineering, HR, contracts, and executive leadership to embed security practices across the business.
Emerging Threats and Continuous Improvement
Stay informed of emerging threats, vulnerabilities, and regulatory changes.
Evaluate and adopt new security tools, frameworks, and practices to maintain a forward-leaning security posture.
Participate in external cybersecurity working groups and forums to evaluate and share best practices.
Required Qualifications:
Currently hold an active U.S security clearance or be able to obtain one
Bachelor's degree in Computer Science, Cybersecurity, Information Systems, or a related field.
8+ years of progressive experience in information security roles, including 2+ years in a leadership capacity.
In-depth knowledge of cybersecurity frameworks (NIST, CMMC, DFARS, RMF).
Strong technical background securing hybrid environments (Windows/Linux, on-premises, cloud).
Proven incident response experience and technical security engineering skills.
Relevant certifications: CISSP, CISM, or equivalent.
Must be able to travel occasionally to customer sites and secure facilities as needed.
Desired Qualifications:
Master's degree in Cybersecurity, Information Assurance, or related field.
Experience with FedRAMP, ISO 27001, SCAP scanning, and RMF process implementation.
Familiarity with DevSecOps, secure coding practices, and software supply chain security.
Hands-on scripting experience (Python, Bash, PowerShell) and familiarity with infrastructure-as-code concepts.
Salary Range:
$150,000-$175,000*
Job Type:
Full-Time Salary/Exempt
Clearance Information: Some positions will require access to U.S. National Security information. Positions that require this access will be required to receive and maintain a U.S. government personnel security clearance (PCL). In order to qualify for this position, the candidate must be a US Citizen and either currently possess this National Security eligibility or be able to complete the investigation application process with a favorable determination and maintain that eligibility throughout their employment.
EEOC & Know Your Rights: Accelint companies are Equal Opportunity Employers. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability, status as a protected veteran or any other status protected by applicable federal, state, and local law. We ensure that all employment decisions, including hiring, promotion, compensation, and other terms and conditions of employment, are based on merit, qualifications, and business needs. For more information about your rights, please review the "Know Your Rights" poster from the Equal Employment Opportunity Commission (EEOC).
ADA: In compliance with the Americans with Disabilities Act (ADA), if you have a disability and would like to request an accommodation within the application and selection process, please contact ********************.
E-Verify: Accelint companies utilizes E-Verify to confirm employment eligibility to work in the United States. Verification occurs after the employee has been hired and completes the Form I-9.
*Salary Range: The listed pay scale reflects the broad, minimum to maximum, pay scale for this position for the location for which it has been posted and is not a guarantee of compensation or salary. Other compensation considerations may include, but are not limited to, job responsibilities, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, or other applicable factors.
Benefits Include:
Paid Time Off
Paid Company Holidays
Medical, Dental & Vision Insurance
Optional HSA and FSA
Base and Voluntary Life Insurance
Short Term & Long-Term Disability Insurance
401k Matching
Employee Assistance Program
Cybersecurity Lead/Information Systems Security Officer (ISSO)
Information security analyst job in San Diego, CA
Data Intelligence, LLC is seeking a highly experienced Cyber Security Lead / Information Systems Security Officer (ISSO) to support cybersecurity operations and compliance for Navy and Department of Defense (DoD) systems. This role requires deep expertise in Information Assurance (IA), cybersecurity compliance frameworks, and Navy-specific cybersecurity practices. The ideal candidate will have extensive experience working with Navy Cross Domain Solutions (NCDSO) and a strong technical background in military C4I/IT systems.
Key Responsibilities:
Serve as the Cyber Security Lead/ISSO for classified and unclassified Navy/DoD systems.
Lead Risk Management Framework (RMF) efforts in accordance with DoD 8500 Series, NIST SP 800 Series, and other applicable cybersecurity policies and guidelines.
Develop, review, and manage technical documentation including System Security Plans (SSPs), Security Assessment Reports (SARs), and Plan of Action & Milestones (POA&Ms).
Interface with the Navy Cross Domain Solutions Office (NCDSO) to support secure cross-domain solutions, including submission packages and coordination of approvals.
Provide subject matter expertise in support of system security engineering, integration, and testing.
Coordinate with system engineers, developers, and stakeholders to ensure security controls are effectively implemented.
Monitor systems for compliance with DFARS Clause ************ and other DoD IA requirements.
Assist in the preparation and review of technical instructions, engineering plans, and test-related documentation.
Maintain up-to-date knowledge of emerging cybersecurity threats, tools, and regulatory requirements.
Support system Certification and Accreditation (C&A) processes in accordance with NSA and DoD standards.
Required Qualifications:
Education:
Master's degree from an accredited college or university in Computer Science, Information Systems Management, Cybersecurity, or a related field.
Experience:
Minimum of 10 years of Navy or DoD experience in Information Assurance and Cybersecurity.
At least 5 years of recent experience (within the last 5 years) directly supporting Navy cybersecurity programs and RMF processes.
Direct experience with the Navy Cross Domain Solutions Office (NCDSO) within the last five years.
Demonstrated expertise in DoD cybersecurity requirements, including the DoD 8500 Series and NIST SP 800 Series.
Experience with engineering documentation including technical instructions, engineering plans, and systems integration documents.
Strong understanding of military C4I/IT systems, including Navy SATCOM (MILSATCOM and Commercial), Tactical Communications, and GPS systems.
High familiarity with the NSA certification process for secure systems.
Certifications:
Compliant with DFARS Clause ************ for Information Assurance Contractor Training and Certification (e.g., CISSP, CISM, Security+, or equivalent).
Security Clearance:
Must hold an active Top Secret / SCI (TS/SCI) clearance.
Preferred Skills:
Strong leadership and communication skills with the ability to brief senior stakeholders.
Ability to lead complex cybersecurity projects with minimal supervision.
In-depth knowledge of secure system design and implementation in classified environments.
Experience collaborating with cybersecurity authorities across Navy and DoD organizations.
About Data Intelligence, LLC:
Data Intelligence, LLC (DI) is a small business that provides Information Technology System Development (Agile, DevSecOps, Cloud Platform support) Cybersecurity (RMF, Security Engineering, Cross Domain Solutions), Tactical Data Link Standards Development and Testing, and Logistics/Warehousing services to U.S. federal clients both CONUS and OCONUS. DI consistently demonstrates exceptional customer service, maintains an employee-centric culture, and delivers hands-on technical expertise to help our clients achieve their mission.
Since 2005, DI has successfully provided IT Systems Engineering, Software Development, Cybersecurity, and supporting solutions and services to customers that include the Department of Defense, Intelligence, and Federal Civilian clients. Current clients include the US Navy, Air Force, Army, Marine Corps, Coast Guard, National Geospatial-Intelligence Agency, Defense Logistics Agency, and The Department of Homeland Security. DI is headquartered in Marlton, New Jersey, with satellite offices in California, Maryland, Ohio, Pennsylvania, Virginia, and Washington, D.C.
Why you should join us:
Data Intelligence offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays.
Data Intelligence is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
Information Security Engineer
Information security analyst job in Temecula, CA
It's fun to work in a company where people truly BELIEVE in what they're doing!
We're committed to bringing passion and customer focus to the business.
The Information Security Engineer is responsible for contributing to the corporate Information Security program by assisting in the identification, recommendation and implementation of industry leading application security tools and techniques. The incumbent will also maintain and update application security processes and procedures and train team members on any relevant updates.
This position is remote, but local to the Temecula, CA office.
Essential Functions
Assist with the development, implementation, and administration of information security policies, standards, and procedures, adhering to industry best practices
Assist in integrating regulatory compliance requirements (e.g., PCI, GLBA) into the organizational security roadmap
Assist in ensuring that the corporate IT environment is secure and complies with all external audit requirements and federal standards
Coordinate with IT Operations to ensure endpoints and network devices conform to security standards, and that security devices and controls are working as designed
Assist in the identification, evaluation and implementation of industry leading application security tools and techniques
Plan, coordinate, and implement security measures to regulate access to computer data files and prevent unauthorized modification, destruction, or disclosure of information
Perform risk assessments and execute system tests to ensure proper functioning of data processing activities and security measures
Identify potential security risks, and define and document remediation options or mitigating controls
Perform security incident investigations including: chain of custody, containment measures, root cause analysis, and identification of preventive measures
Define and assist in the management of an Incident Response Team that addresses potential or in-progress security events, establishing and adhering to escalation procedures and response times
Perform information systems evidence gathering, to support e-discovery requests and messaging searches
Perform security reviews on requests for new commercial software or material configuration changes to existing software
Perform periodic internal IT security audit functions on IT operational controls, to include system access controls, firewall rule reviews, etc.
Participate in on-call rotation
Perform related duties as requested
Essential Knowledge, Skills, & Abilities
Excellent written and verbal communication skills required
Solid presentation skills
Significant knowledge of security-oriented regulatory requirements and compliance
Excellent familiarity with IT security principles and practices including firewalling, hardening, data loss prevention, threat prevention, and identity management.
Ability to provide technical guidance to less experienced team members
Knowledge of the mortgage industry is helpful, but not required
Commitment and ability to cultivate a diverse and inclusive work environment.
Education
Bachelor's degree in computer science, Engineering, Information Systems Security or a related field is required.
Security class certifications strongly preferred
Azure certifications preferred
CISSP license preferred
Experience
5+ years of related IT experience required
2+ years in an Information Security engineering role
3+ years of experience in a regulated IT environment including some combination of SOX, HIPAA, GLBA, PCI preferred
Compensation and Benefits
Covius offers an extensive benefits package for all employees, including medical, dental, vision and 401(k)!
Compensation: $96,000 to $120,000 annually with a 10% AIP opportunity
Application Guidelines:
For best consideration, please submit your resume and application materials as soon as possible. Review of applications will begin immediately.
Working Conditions
Work is performed in a climate controlled indoor administrative office setting. The noise level in the work environment is usually quiet to moderate, depending upon the office or meeting location.
Physical Demands and Activities
While performing the duties of this job, the employee is frequently required to communicate. The employee frequently is required to remain stationary. The employee is frequently required to move about the office, operate a computer and other office machinery, such as calculator, copy machine, and computer printer; rarely position self to maintain files; rarely moves boxes weighing up to 10 lbs. Close and distance observation required with the ability to observe objects at close range in presence of glare or bright lighting (e.g., computer screen). Must possess the ability to communicate information and ideas so others will understand and have the ability to interact with external and internal stakeholders.
Covius is committed to equal opportunity in all employment practices to all qualified applicants and employees without regard to race, color, religion, gender, gender identity, age, national origin, pregnancy, disability, genetics, marital status, military or veteran status or any other protected category as established by local, state, and federal law. This policy applies to all aspects of the employment relationship including recruitment and hiring, placement, promotion, transfer, compensation, disciplinary action, layoff, leaves of absence, training, and termination. All such employment decisions will be made without unlawful discrimination based on any prohibited basis.
The essential functions, working conditions and physical demands described above are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of this position.
Please note that all s are not intended to be all-inclusive. This job description is not designed to cover all activities, duties or responsibilities that are required of the employee for this job. Employees may be required to perform other duties at any time with or without notice to meet the ongoing needs of the organization.
If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us!
Auto-ApplyIndustrial Security Analyst
Information security analyst job in San Diego, CA
RELOCATION ASSISTANCE: No relocation assistance available CLEARANCE TYPE: SecretTRAVEL: Yes, 10% of the TimeDescriptionAt Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
Northrop Grumman Mission Systems is seeking an Industrial Security Analyst to develop, and administer security programs and procedures for classified or proprietary materials, documents, and equipment. Studies and implements federal security regulations that apply to company operations. Obtains rulings, interpretations, and acceptable deviations for compliance with regulations from government agencies. Prepares manuals outlining regulations, and establishes procedures for handling, storing, and keeping records, and for granting personnel and visitors access to restricted records and materials. Conducts security education classes and security audits. Investigates security violations and prepares reports specifying preventive action to be taken.
Basic Qualifications:
2+ years of Industrial Security experience or relevant experience with bachelors' Degree; an additional 4 years of applicable work experience may be substituted.
Current Active Secret clearance with ability to meet enhanced security requirements and obtain/maintain SAP eligibility and access.
In-scope investigation (T5, T5R, SSBI, SBPR, PPR) completed within last 6 years or current enrollment in Continuous Evaluation (CE) program.
US Citizenship required.
Excellent oral and written communication skills.
Knowledge of: DODM 5205.07 V1-4 and DISS, JADE, and/or SIMS.
Must be proficient in MS Office suite (Word, SharePoint, PowerPoint, Excel, Outlook, TEAMs).
Preferred Qualifications:
Top Secret clearance.
ICD 705 Tech Spec.
Experience with government networks CV2, CORE, JADE, etc.
Classification review experience.
Experience completing compliance self-inspections and supporting formal customer compliance inspections.
Excellent customer service and communication skills.
Ability to work in a team environment and follow projects through to completion.
Ability to maintain flexibility to deal with changing priorities and deadlines.
Willing to work extended hours, in a fast paced, deadline driven environment, excellent communication skills speaking, writing skills and organized skills enabling effective communications.
Strong working knowledge of basic office automation tool suites such as MS Office (Word, Excel, PowerPoint).
Primary Level Salary Range: $73,900.00 - $110,900.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
Auto-ApplyInformation Security Analyst
Information security analyst job in San Diego, CA
T3W Business Solutions, Inc. is a Woman-Owned Small Business with Headquarters located in San Diego, CA. It is our mission to help our clients develop strategies to optimize their use of space and resources resulting in maximum benefits; we also deliver quality data and analysis to support our client's daily facility operations, planning, and compliance programs. We are looking for an Information Security Analyst in San Diego, California.
**Contingent Upon Contract Award**
Summary
Implements and monitors cybersecurity controls, perform vulnerability assessments, maintains RMF documentation, supports accreditation requirements, and assists in risk mitigation. Responds to security events, ensures compliance with Navy cybersecurity policies, and strengthens FRCSW cyber posture.
Responsibilities
Implement and monitor information security policies and procedures.
Conduct vulnerability scans and risk assessments.
Support RMF documentation and ATO renewals.
Respond to and document security incidents and audits.
Requirements
Bachelor's degree in Cybersecurity, Computer Science, or related field.
3+ years of experience in information assurance or cybersecurity.
DoD 8570 IAT Level II certification (Security+ CE, CySA+, or equivalent).
Familiarity with NIST, DISA STIGs, and DoD RMF compliance.
Must possess an active Secret Clearance - Required
This contractor and subcontractor shall abide by the requirements of 41 CFR §§ 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on their race, color, religion, sex, sexual orientation, gender identity or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment individuals without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status or disability.
Salary Description $88,000-$102,000
Security Analyst
Information security analyst job in San Diego, CA
Saronic Technologies is a leader in revolutionizing defense autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations for the Department of Defense (DoD) through autonomous and intelligent platforms. Saronic is seeking a Security Analyst to monitor, investigate, and respond to security threats across hybrid environments. This role supports incident response, threat hunting, and continuous improvement of detection, response, and operational effectiveness.Responsibilities:
Monitor, triage, and investigate security alerts and incidents across hybrid environments.
Correlate and assess security, identity, and behavioral data to detect high-risk activity and support insider threat and external threat investigations.
Conduct proactive threat hunts leveraging current intelligence, MITRE ATT&CK techniques, and establishing baselines to identify undetected threats or weaknesses.
Contribute to operational runbooks, detection playbooks, and case documentation.
Participate in an on-call rotation responding to security events and supporting incident response investigations.
Collaborate with internal teams to enhance detection logic, improve workflows and automations.
Stay current with evolving threat landscape and maintain situational awareness across organizational assets and environments.
Required Qualifications:
3+ years of hands-on experience in a security operations center or part of a cybersecurity incident response team.
Proficient with SOC and incident response platforms, including SIEM, EDR, threat intelligence, and SOAR solutions, with experience in endpoint and network forensics, root-cause analysis, and incident reporting.
Demonstrated ability to use scripting and automation languages for data analysis and investigation, and familiarity with infrastructure-as-code frameworks used in production environments.
This role requires the ability to obtain and maintain a security clearance
Preferred Qualifications:
Familiarity with Department of Defense (DoD) or military industry events.
Industry recognized certifications (GCIH, GCIA, GNFA, GREM, CEH, etc.).
Physical Demands:
Prolonged periods of sitting at a desk and working on a computer.
Occasional standing and walking within the office.
Manual dexterity to operate a computer keyboard, mouse, and other office equipment.
Visual acuity to read screens, documents, and reports.
Occasional reaching, bending, or stooping to access file drawers, cabinets, or office supplies.
Lifting and carrying items up to 20 pounds occasionally (e.g., office supplies, packages).
Benefits:Medical Insurance: Comprehensive health insurance plans covering a range of services Saronic pays 100% of the premium for employees and 80% for dependents Dental and Vision Insurance: Coverage for routine dental check-ups, orthodontics, and vision care Saronic pays 100% of the premium under the basic plan for employees and 80% for dependents Time Off: Generous PTO and HolidaysParental Leave: Paid maternity and paternity leave to support new parents Competitive Salary: Industry-standard salaries with opportunities for performance-based bonuses Retirement Plan: 401(k) plan Stock Options: Equity options to give employees a stake in the company's success Life and Disability Insurance: Basic life insurance and short- and long-term disability coverage Pet Insurance: Discounted pet insurance options including 24/7 Telehealth helpline Additional Perks: Free lunch benefit and unlimited free drinks and snacks in the office
This role requires access to export-controlled information or items that require “U.S. Person” status. As defined by U.S. law, individuals who are any one of the following are considered to be a “U.S. Person”: (1) U.S. citizens, (2) legal permanent residents (a.k.a. green card holders), and (3) certain protected classes of asylees and refugees, as defined in
8 U.S.C. 1324b(a)(3)
.
Saronic does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.
Auto-ApplyNetwork Security Analyst I
Information security analyst job in San Diego, CA
Select Cyber, an Information Security recruitment specialty firm, seeks to fill the following role for our client:
Network Security Analyst I
Be part of a cutting-edge Computer Incident Response Team, (CIRT) for a fortune 500 company. We are looking for individuals that want to learn a new field and grow with the company. Training provided.
The selected candidate will be a part of the Security Operations Center (SOC) and its mission to improve the information security of our customers using a Security Information and Event Management (SIEM) tool to detect and analyze IT security incidents.
Responsibilities:
Perform the following functions as individual assignments or as part of a team:
· Monitoring client networks for signs of adversarial activity.
· Respond to alerts from various monitoring systems and platforms providing indicators for enterprise defensive measures.
· Analyze reports to understand threat campaign(s) techniques, lateral movements and extract indicators of compromise (IOCs).
· Triage potentially malicious events to determine severity and criticality of the event.
· Follow procedures to analyze and escalate security incidents which vary from customer to customer.
Experience
· 1+ years technical experience in the Information Technology field.
· Experience with Intrusion Detection & Prevention Systems (IDS/IPS) or Firewalls & Log Analysis a plus.
· Technical degree, Associate or Bachelor's degree from an accredited institution in Computer Science or information technology field preferred.
· CompTIA Network+/Security+ certifications is a plus
Information Systems Security Officer
Information security analyst job in Camp Pendleton South, CA
**MANTECH** seeks a motivated, career and customer-oriented **Information Systems Security Officer** with strengths in Information Systems Security to join our team at Marine Corps Base **Camp Pendleton California.** This position will assist Marine Corps Warfighting Laboratory (MCWL) prepare for and maintain the IT infrastructure, IT capabilities and Audio-Visual capabilities to support emerging ICD 705 Sensitive Compartmentalized Information Facilities (SCIFs) and Special Access Control Facilities (SAPFs) through planning, activation and operations.
**Responsibilities include but are not limited to:**
+ Experience in network design, network monitoring, systems development, and knowledge of Information Assurance (IA) policies, directives, and best practices across DoD and Marine Corps.
+ Knowledge and experience with organizations within the Marine Corps responsible for facilitating network approvals and connections.
+ Work with various Marine Corps, Navy, Joint, and other services to coordinate installs supporting Initial Operating Capability (IOC) and Final Operating Capability (FOC).
+ Ability to communicate and provide effective staff coordination across government, Marine Corps, and contractor organizations.
+ Support the facility Site Security Manager (SSM)/Special Security Representative (SSR) and Information Systems Security Manager (ISSM) to oversee the secure installations and operations of systems across multiple security domains and in accordance with policies, directives, and best practices.
+ Establishes and satisfies complex system-wide information security requirements based upon the analysis of user, policy, regulatory, and resource demands. Supports Marine Corps and other customers at the highest levels in the development and implementation of doctrine and policies.
**Minimum Qualifications:**
+ Bachelor's degree and at least 10 years' experience planning and/or operating IT infrastructure within ICD 705 facilities.
+ Experience with network security aspects of installations and operations.
**Preferred Qualifications:**
+ Experience with MS Word, MS Power Point
**Clearance Requirements** **_:_**
+ Candidate must have a current/active Top Secret clearance with the ability to obtain and maintain a TS/SCI clearance prior to starting this position.
**Physical Requirements:**
+ Ability to maintain construction security oversight in outdoor environment; walk (with personal protective equipment) to inspect and document delivery of components and assembly/construction of structure.
MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.