Post job

Information security analyst jobs in Fresno, CA - 1,052 jobs

All
Information Security Analyst
Senior Security Engineer
Security Engineer
Senior Security Analyst
Information Systems Security Officer
Information Security Officer
Senior Information Security Analyst
Information Technology Analyst
Information Security Administrator
Information Security Director
Security Architect
  • Senior Security GRC Analyst

    Lambda Inc. 4.2company rating

    Information security analyst job in San Francisco, CA

    Lambda, The Superintelligence Cloud, is a leader in AI cloud infrastructure serving tens of thousands of customers. Our customers range from AI researchers to enterprises and hyperscalers. Lambda's mission is to make compute as ubiquitous as electricity and give everyone the power of superintelligence. One person, one GPU. If you'd like to build the world's best AI cloud, join us. Note: This position requires presence in our San Francisco or San Jose office location 4 days per week; Lambda's designated work from home day is currently Tuesday. What You'll Do Validate and verify the organization's security controls and practices meet the requirements of ISO 27001, 27701, PCI, SOC 2 and other relevant regulatory requirements to ensure alignment to business objectives Manage IT Risk Register including risk identification, tracking, and prioritization. Assist with and drive remediation of control deficiencies and gaps Provide guidance to Control Owners in the planning, design, implementation, operation, maintenance & remediation of control activities and other supporting requirements (e.g. policies, standards, processes, system configurations, etc.) Communicate with technical and non-technical stakeholders and leaders on cybersecurity risk and controls management topics and program-specific reporting Assist with the Customer Trust program which may include managing customer assessments, and security questionnaires Assist control owners with root cause analysis and track risk management action plan progress. Create risk metrics for management regarding information security control maturity, compliance status, risks, performance and findings Assist with the third-party risk management assessment process, ensuring consistent enforcement of information security requirements You Have a minimum of 8 years of experience supporting cybersecurity risk or controls management programs with in-depth knowledge and experience of cybersecurity frameworks including ISO 27001 and 27701, PCI-DSS, SOC, NIST CSF and other regulatory requirements Have experience managing and running audits, certification programs and control assessments. This includes but is not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, and mapping issues to risks Have experience collaborating closely with engineers, business teams, and security partners, including incident response, red teams, and architects to seamlessly incorporate cybersecurity controls and risk management processes into their day-to-day operations Possess a strong ability to define, drive and execute a program vision, strategy, approach and milestones in alignment with organization priorities and initiatives Nice to Have Experience in the machine learning or computer hardware industry Experience with Security by Design and/or Privacy by Design principles Experience with standard cyber controls frameworks, including CIS Top18, NIST Cyber Security Framework (CSF), NIST 800.53, NIST 800.171, CMMC, Cybersecurity Maturity Model Certification (CMMC), ISO 27001 and 27701, and SOX ITGC control frameworks. Broad knowledge of IT infrastructure and architecture of computer systems as well as exposure to a variety of platforms such as operating systems, networks, databases, and ERP systems Familiarity with using third‑party tools such as Audit Board, Whistic, RSA Archer, ServiceNow for third‑party risk management Certified Information Systems Auditor (CISA) Certified Information Security Manager (CISM) Certified Information Systems Security Professional (CISSP) Certified in Risk and Information Systems Control (CRISC) Experience in the AI infrastructure, machine learning and/or computer hardware industry Salary Range Information The annual salary range for this position has been set based on market data and other factors. However, a salary higher or lower than this range may be appropriate for a candidate whose qualifications differ meaningfully from those listed in the job description. About Lambda Founded in 2012, with 500+ employees, and growing fast Our investors notably include TWG Global, US Innovative Technology Fund (USIT), Andra Capital, SGW, Andrej Karpathy, ARK Invest, Fincadia Advisors, G Squared, In‑Q‑Tel (IQT), KHK & Partners, NVIDIA, Pegatron, Supermicro, Wistron, Wiwynn, Gradient Ventures, Mercato Partners, SVB, 1517, and Crescent Cove We have research papers accepted at top machine learning and graphics conferences, including NeurIPS, ICCV, SIGGRAPH, and TOG Our values are publicly available: ************************* We offer generous cash & equity compensation Health, dental, and vision coverage for you and your dependents Wellness and commuter stipends for select roles 401k Plan with 2% company match (USA employees) Flexible paid time off plan that we all actually use A Final Note: You do not need to match all of the listed expectations to apply for this position. We are committed to building a team with a variety of backgrounds, experiences, and skills. Equal Opportunity Employer Lambda is an Equal Opportunity employer. Applicants are considered without regard to race, color, religion, creed, national origin, age, sex, gender, marital status, sexual orientation and identity, genetic information, veteran status, citizenship, or any other factors prohibited by local, state, or federal law. #J-18808-Ljbffr
    $127k-172k yearly est. 6d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Lead Security Engineer

    Goswift

    Information security analyst job in San Francisco, CA

    Swiftly is on a mission to help cities move more efficiently. We are the leading transit data platform for agencies to share real‑time passenger information, manage day‑to‑day operations, and improve service performance. Today, over 180 transit agencies in 12 countries - including LA Metro, MARTA, SEPTA, and MBTA - rely on Swiftly to improve on‑time performance by up to 40% and increase passenger information accuracy by up to 50%. The result is better service reliability, increased ridership, and more efficient transit operations. Even though Swiftly's HQ office is located in San Francisco, CA, we are open to candidates in most locations across the U.S. as well as Ontario and British Columbia, Canada. At this time we are unable to provide Visa sponsorship. Engineering at Swiftly Engineering at Swiftly is not only about writing code - we believe in creating empowered product teams that work together to conceptualize new features and bring them to life. Each team aims to strike a balance between delivering incremental improvements, creating prototypes to test new ideas and mitigate risks, and building scalable software using industry best practices. We're guided by a mission to positively impact transit riders, and we embrace humility and intentionality in how we make technical decisions so that we best meet our customers' needs. About the Role We're looking for a Lead Security Engineer to join our Platform team and mature Swiftly's security posture. We believe excellent security isn't just about tools and controls; it's about empowering product, infrastructure, and corporate IT teams across our organization to make secure decisions every day. In this role, you'll partner closely with engineering, product, and go‑to‑market teams to design secure solutions, build DevSecOps tooling, and drive our compliance roadmap. You'll balance strategic initiatives with hands‑on work in our cloud‑native environment. We're looking for someone equally comfortable working on codebases and leading cross‑functional initiatives, a force multiplier who can train teams, represent security to customers and executives, and make security a natural part of how Swiftly ships products. We use AI tools for scheduling and summarization in our hiring process. We do not use AI tools to make decisions about who moves forward or to assess the strength of candidates. Every application is reviewed and all hiring decisions are made by Swiftly team members. This is an active, open role that we are currently hiring for at Swiftly. What You'll Do Make Swiftly Secure Own Swiftly's security risk register and threat models; identify, prioritize, and drive remediation of risks across application and infrastructure. Design secure architectures for our SaaS platform, mobile applications, and IOT/Hardware Integration, focusing on authentication, authorization, data protection, and network boundaries. Recommend, implement, and manage security tools end‑to‑end. Build DevSecOps guardrails into CI/CD so vulnerabilities, misconfigurations, and license issues surface early. Conduct internal security assessments and coordinate engagements with external penetration testers. Own security policies and standards; ensure they're practical, adopted, and measurable. Define standards for secure adoption of AI coding assistants, building reusable patterns, custom configurations, and guardrails that help developers move fast safely. Compliance & Customer Trust Lead renewals and continuous readiness for existing certifications like SOC 2. Proactively identify security frameworks required for international expansion; scope cost, level of effort, and timelines to inform market entry decisions; and lead execution of new certifications. Respond to customer security and compliance inquiries and support product marketing with security content. Incident Response & Detection Design and maintain security incident response plans, playbooks, and escalation paths. Serve as an escalation point for security incidents; lead triage, root cause analysis, and remediation. Security Leadership Define and maintain security KPIs and dashboards for executive and board reporting. Give teams visibility into their security posture and coach them to improve. Influence roadmap prioritization to ensure security and compliance are first‑class concerns. Mentor engineers in secure design and help grow a security‑aware culture across Swiftly by delivering security training and office hours for developers and other stakeholders. Drive corporate IT security strategy, including endpoint hardening, email security, IAM standards, and periodic access reviews. What will set you up for success 5+ years of experience in security engineering with both strategic and hands‑on work. Strong experience securing cloud‑native environments (AWS preferred), including IAM, networking, logging/monitoring, and secrets management. Hands‑on experience with infrastructure‑as‑code (Terraform) and policy‑as‑code frameworks (OPA, Sentinel, or similar). Background building security into CI/CD pipelines and development workflows. Familiarity with container and orchestration security. Excellent threat modeling and risk assessment skills; able to translate complex risks into clear options and tradeoffs. Experience with compliance frameworks (SOC 2 preferred) and audit processes. Strong communication skills; comfortable working across technical and non‑technical teams. Self‑directed and comfortable operating with autonomy. Nice to Haves Relevant certifications (CISSP, cloud security certifications). Experience advising on security for AI/ML or LLM‑powered features. Mobile application security experience (Android preferred). Experience with GRC and compliance platforms. Background in application security or penetration testing. Experience with international compliance frameworks. Familiarity with regulated industries or public sector requirements. Experience with physical device security (IoT, embedded systems, or field‑deployed hardware). Experience with Mobile Device Management (MDM) solutions for enterprise or fleet deployments. Pay Range In accordance with pay transparency laws, please see the approximate salary ranges below. These ranges represents the anticipated low and high end of the salary for this position. Actual salaries will vary and are based on a multitude of non‑discriminatory factors including final role leveling decisions, a candidate's relevant work experiences/skills, and geographic location. Salary is one component of Swiftly's total compensation package, which also includes stock options, competitive benefits, 401(k)/RRSP matching, a fantastic team and culture, opportunity to have a huge impact, emphasis on professional growth and holistic wellness, and other perks. US Salary Range: $140,000 - 200,000 Canadian Salary Range: $165,000 - 200,000 Beyond the Skills We are looking for candidates who are passionate about mobility, sustainability, or mission‑oriented projects that have a significant real‑world impact. Ideal candidates encompass the core values of our company: Team. Together, we are more effective and better supported. Impact. Drive impact for our customers, our company, and all of our teams. Diversity. See differing perspectives as ways to address our weaknesses and find new strengths. Communication. Assume others internally and externally have good intentions. Feedback. We share feedback because we want each other to grow professionally and personally. Growth. Foster personal, professional, and company growth. Benefits Competitive salary Equity compensation (company ownership) for every employee Medical, Dental and Vision Retirement with Employer Match Flexible Spending Account (FSA) Home office setup reimbursement Monthly cell/internet reimbursement Monthly "Be Well" stipend Flexible PTO with a recommended minimum Flexible work environment 16 paid holidays - including months without U.S. national holidays 8 fully paid weeks of leave for childbirth/adoption Travel note Swiftly employees can generally expect to travel 1-2 times a year for in‑person company or team offsites. As a fully distributed company, we consider these offsites important for cultivating strong relationships across our teams! Attending these in‑person is expected and encouraged, although we understand everyone has different personal circumstances and we will consider requests for exceptions. Customer‑facing team members and other specific roles may be expected to travel more frequently. Equal Opportunity Statement We are an equal opportunity employer - we are committed to a workplace that is as dynamic, diverse, and passionate as the communities we serve. #J-18808-Ljbffr
    $165k-200k yearly 6d ago
  • Senior Security Analyst - Heartflow Heartflow

    Isc2 Eastbay Chapter

    Information security analyst job in San Francisco, CA

    Heartflow is a medical technology company advancing the diagnosis and management of coronary artery disease, the #1 cause of death worldwide, using cutting‑edge technology. The flagship product-an AI‑driven, non‑invasive cardiac test supported by the ACC/AHA Chest Pain Guidelines called the Heartflow FFRCTAnalysis-provides a color‑coded, 3D model of a patient's coronary arteries indicating the impact blockages have on blood flow to the heart. Heartflow is the first AI‑driven non‑invasive integrated heart care solution across the CCTA pathway that helps clinicians identify stenoses in the coronary arteries (RoadMap™Analysis), assess coronary blood flow (FFRCTAnalysis), and characterise and quantify coronary atherosclerosis (Plaque Analysis). Our pipeline of products is growing and so is our team; join us in helping to revolutionise precision heart‑care. Heartflow is a publicly traded company (HTFL) that has received international recognition for exceptional strides in healthcare innovation, is supported by medical societies around the world, cleared for use in the US, UK, Europe, Japan and Canada, and has been used for more than 500,000 patients worldwide. Overview The Heartflow Information Security team is responsible for security across our corporate and product environments, protecting our patient data and medical device ecosystem. We are looking for an investigator that loves the challenge of analysing complex security telemetry to uncover hidden threats and ensure a resilient defence for our corporate and product environments. The initial focus will be on triaging advanced security events and participating in our security incident response process. Analytical work will span our corporate, clinical and cloud infrastructure and will include threat hunting and the refinement of high‑fidelity detection logic. What You'll Do Perform in‑depth analysis of security events, logs, and network traffic using SIEM, EDR, and other security tools to rapidly identify, contain, and remediate complex threats. Collaborate in developing and implementing custom correlation rules, dashboards, and alerts to enhance detection capabilities. Drive threat hunts to find “quiet” persistent threats within our clinical and corporate environments. Participate in continuous refinement of incident response playbooks, operational procedures, and security standards. Perform security reviews of third‑party vendors to identify risks and ensure they meet company standards. What You Bring Education - BS in Computer Science or a related technical degree. No degree? No problem-if you have the equivalent experience and certifications, we want to hear from you. Experience - At least 2 years in the trenches of a SOC or Incident Response team. However, if you haven't held a formal “Security” title but have at least 2 years on an IT Operations team, we value deep technical expertise in operating systems and networking if you can show us your passion for security. You're comfortable navigating security platforms like SIEMs, EDR tools (CrowdStrike or similar), and Email Security platforms. Strong problem‑solving skills with the ability to troubleshoot security issues across networks, operating systems, and applications. Possess a solid understanding of log correlation and how to write logic for security alerts. Deep understanding of at least one of the operating system internals (Windows, Linux, or mac OS). Ability to analyse process trees. Able to analyse network flows and packet data to find hidden threats. You know your way around network tools and can spot anomalies across different types of environments. What Helps You Stand Out Certifications: SANS GIAC (GCIH, GCIA), CompTIA (Security+, CySA+), EC‑Council (C|SA) or equivalent. Proven ability to take initiative- track record of identifying problems and developing solutions independently. Excellent written and verbal communication skills, with the ability to clearly articulate complex technical issues and remediation plans to both technical and non‑technical audiences. You are a continuous learner who stays curious about the latest attack trends and loves figuring out how to stop them. A reasonable estimate of the base salary compensation range is $75,000 to $100,000 per year, and bonus. #LI-IB1 Heartflow is an Equal Opportunity Employer. We are committed to a work environment that supports, inspires, and respects all individuals and do not discriminate against any employee or applicant because of race, color, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression, veteran status, or any other status protected under federal, state, or local law. This policy applies to every aspect of employment at Heartflow, including recruitment, hiring, training, relocation, promotion, and termination. Positions posted for Heartflow are not intended for or open to third‑party recruiters / agencies. Submission of any unsolicited resumes for these positions will be considered to be free referrals. Heartflow has become aware of a fraud where unknown entities are posing as Heartflow recruiters in an attempt to obtain personal information from individuals as part of our application or job offer process. Before providing any personal information to outside parties, please verify the following: A) All legitimate Heartflow recruiter email addresses end with “@heartflow.com” and B) The position described is found on our careers site at ********************************* #J-18808-Ljbffr
    $75k-100k yearly 4d ago
  • GenAI ML Engineer - Secure AI Workflows & LLM Tuning

    Protegrity USA, Inc. 4.0company rating

    Information security analyst job in Palo Alto, CA

    A leading data protection firm is seeking a Machine Learning Engineer to develop GenAI architectures and secure AI workflows. Ideal candidates should hold a PhD or MS in Computer Science and possess 2+ years of relevant experience. Key responsibilities include developing and testing machine learning models, conducting experiments, and collaborating within a team. The role offers competitive compensation along with benefits including health, PTO, and 401K options. #J-18808-Ljbffr
    $127k-179k yearly est. 6d ago
  • Senior Security Engineer - Bitcoin/Lightning Platform

    Lightning Labs 3.9company rating

    Information security analyst job in Palo Alto, CA

    A leading tech company in Palo Alto is seeking a Security Engineer to ensure security best practices across systems. Responsibilities include designing security testing infrastructure, performing audits, and mentoring team members. Ideal candidates have over 5 years of experience in systems security, strong knowledge of cryptography, and the ability to work with distributed teams. Familiarity with Bitcoin and the Lightning Network is highly desirable. #J-18808-Ljbffr
    $139k-188k yearly est. 2d ago
  • Senior Security Engineer: Security Operations & IR

    Medium 4.0company rating

    Information security analyst job in San Francisco, CA

    A leading technology company in California is seeking a Senior Security Engineer to shape the security and resilience of its systems and services. This role involves designing, building, and implementing security monitoring and response capabilities while collaborating with product, engineering, and IT teams. The ideal candidate will have strong expertise in security event management, incident response, and automation, along with experience in AWS and EDR solutions. Join this innovative team that is committed to technology for sustainable solutions. #J-18808-Ljbffr
    $140k-190k yearly est. 2d ago
  • Senior IAM Security Engineer - Zero-Trust Auth & PKI

    Gemini 4.9company rating

    Information security analyst job in San Francisco, CA

    A leading crypto platform is seeking a Senior IAM Security Engineer to secure identity and access management systems. The role involves developing IAM services, collaborating with engineering teams, and ensuring secure authentication patterns. Candidates should have solid software development skills in Python or Go, experience with PKI and secrets management, and a strong understanding of identity protocols. This position offers a competitive salary and a hybrid work approach, with office presence required twice a week in San Francisco or New York City. #J-18808-Ljbffr
    $136k-192k yearly est. 6d ago
  • Senior Security Engineer

    Qualified 3.8company rating

    Information security analyst job in San Francisco, CA

    Qualified is the Agentic Marketing Platform for B2B companies. With Piper the AI SDR Agent, Qualified offers a whole new way to grow inbound pipeline. Piper operates across both the website and email, working to engage website visitors, capture leads, and convert buyers into pipeline around the clock. Hundreds of the world's leading brands-including Crunchbase, Asana, Box, and Grubhub-choose Qualified to increase lead conversions, generate more meetings, and improve efficiency within their inbound pipeline motion. Overview We're looking for a deeply experienced Senior Security Engineer to establish and lead our security engineering function as our first dedicated security engineer hire. You'll serve as the security champion for our 50+ person engineering organization, partnering closely with our platform, infrastructure, and engineering leadership teams to mature and enhance our existing security posture. This is a foundational role where you'll have the opportunity to evolve our security strategy, strengthen existing security controls, and establish advanced security practices across our entire technology stack. You'll drive initiatives that protect our AI-powered platform, customer data, and business operations while enabling safe, high-velocity development. If you're passionate about building robust security programs, love solving complex security challenges, and enjoy elevating security awareness across engineering teams, this role is for you. What You'll Do Evolve and Mature Security Practices: Build upon our existing security foundation by designing and implementing advanced security controls, policies, and practices that scale with our growth and align with industry best practices. Drive Proactive Security Assessments: Systematically identify security vulnerabilities and weak points across our systems through threat modeling, security reviews, and risk assessments. Develop and execute comprehensive remediation roadmaps. Partner with Corporate Security: Collaborate closely with our corporate security team to align technical security initiatives with broader organizational security policies, compliance requirements, and risk management objectives. Secure the Platform & Infrastructure: Work hand-in-hand with our platform and infrastructure teams to harden cloud environments, implement security automation, and build security into our CI/CD pipelines and deployment workflows. Implement Security Tooling & Monitoring: Deploy and manage security tools including SAST/DAST scanners, vulnerability management systems, security monitoring, and incident response capabilities. Incident Response & Forensics: Lead security incident response efforts, conduct post-incident analysis, and continuously improve our security incident handling capabilities. What We're Looking For 6+ years of software engineering experience with 3+ years in security engineering, application security, or infrastructure security roles, with proven experience building security programs at high-growth technology companies. Deep cloud security expertise with AWS, Kubernetes, and cloud-native security tools. Experience securing containerized environments. Strong application security background including secure code review, vulnerability assessment, penetration testing, and familiarity with OWASP Top 10 and common attack vectors. Infrastructure security experience with network security, identity and access management (IAM), secrets management, and security automation using infrastructure-as-code. Strong communication and collaboration skills; able to translate complex security risks into business impact and work effectively with engineering teams to drive security improvements. Regulatory and compliance knowledge with frameworks like SOC 2, ISO 27001, GDPR, and experience implementing technical controls to meet compliance requirements. Why Join Qualified Foundational Impact: As our first security hire, you'll mature our security program and directly shape how we approach advanced security practices across all aspects of our business. High-Growth Environment: Join us at a pivotal stage where you can establish security best practices that will scale with our rapid growth and expansion. Cutting-Edge AI Security: Work on unique security challenges related to AI driven products and help define security standards for B2B AI applications. Close Leadership Collaboration: Partner with leadership to ensure security is integrated into our strategic decision-making. Career Growth: Lead and grow the security function as we scale, with opportunities to build and manage a security team as the company expands. If you're ready to take on a high-impact role where you'll establish the security foundation for a fast-growing AI company and drive critical security initiatives from day one, we'd love to hear from you. About Qualified Qualified is the Agentic Marketing platform for B2B companies around the world. Headquartered in San Francisco, Qualified delivers pipeline generation at scale with Piper the AI SDR for thousands of customers like Crunchbase, Demandbase, Greenhouse, Plaid, and Suse. Led by former Salesforce CMO Kraig Swensrud and former Salesforce Product SVP Sean Whiteley, Qualified boasts 1100+ 5-star reviews on G2 and is ranked #1 on the Salesforce AppExchange. Qualified is funded by Sapphire, Tiger Global, Norwest Venture Partners, Redpoint Ventures, and Salesforce Ventures. Visit qualified.com to learn more. One Team We're all in this together with a shared goal: grow the business and each other. Work as a team, win as a team. Collaborate and strategize across departments to deliver A+ work. We are bold thought leaders that value creating a sense of belonging for all and celebrating our wins, big or small. Customer Obsessed Prioritize the customer above everything else. Build a product that our customers love. Establish ourselves as their trusted advisor and do “Whatever it takes” to make them successful. Prove the ROI. Only when our customers win do we win. Think Big & Move Fast We're defining a new category and we have fierce competition. Fast-paced innovation is the name of the game. We look forward. We reimagine. We throw out new ideas. We test things. We move quickly. We challenge the norm. We don't settle for status quo. On the heels of their Series C financing, Qualified is looking to grow the team so that they can do even more, even faster; they're focused on delivering our customers more innovation, additional services, an expanded product portfolio, and even deeper ties into the Salesforce CRM platform. Qualified is looking for folks that are fired up about joining a fast‑paced, fast‑growing company that is doing big things. Diversity & Inclusion Qualified is committed to bringing together individuals from different backgrounds and perspectives. We strive to create an inclusive environment where everyone can thrive, feel a sense of belonging, and do great work together. We are proud to be an equal opportunity employer open to all qualified applicants regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or expression, Veteran status, or any other legally protected status. #J-18808-Ljbffr
    $140k-190k yearly est. 5d ago
  • Senior Security Engineer & Threat Hunter, Detection & Response

    Pantera Capital

    Information security analyst job in Palo Alto, CA

    A leading technology firm in Palo Alto is seeking a knowledgeable security expert to oversee day-to-day threat management and improve incident responses. The ideal candidate has 2+ years of experience in information security and strong Python scripting skills. You will work on enhancing security monitoring and collaborate with various teams to handle security incidents effectively. This role comes with a competitive salary range and comprehensive benefits including equity, medical coverage, and a 401(k) plan. #J-18808-Ljbffr
    $131k-183k yearly est. 4d ago
  • Senior Security Engineer

    Echotwin Ai, Inc.

    Information security analyst job in San Francisco, CA

    EchoTwin AI is pioneering AI-driven infrastructure intelligence, redefining how cities are managed. Powered by a proprietary visual intelligence engine with full spatial reasoning, EchoTwin transforms municipal fleets into mobile urban sensors-creating living digital twins that provide real-time insights into infrastructure, compliance, and safety. By enabling municipalities to proactively monitor, predict, and resolve issues, EchoTwin helps build resilient, self-healing, and sustainable urban ecosystems. More than “smart cities,” EchoTwin is advancing the era of cognizant cities-urban environments with the awareness to see, think, and act on challenges in real time. What The Job Involves Our Engineering teams work at the cutting edge of technology, leveraging AWS and GCP cloud services and developing our own Linux-based edge devices. As a dynamic startup, we understand the critical importance of cybersecurity in protecting our innovative solutions and ensuring the safety of our digital environment and customer data. We're seeking a passionate Security Engineer to lead our cybersecurity initiatives and safeguard our code and infrastructure against ever-evolving threats. You will manage security for our production and corporate systems, handle security alerts, implement policies, and collaborate with external customers on security needs. Responsibilities Develop and implement comprehensive security strategies for our cloud environments (AWS and GCP) and Linux-based systems. Design and implement public/private key management and PKI (Private Key Infrastructure) for our edge devices. Perform regular security audits, risk assessments, and penetration testing to identify vulnerabilities in our code and infrastructure. This includes conducting thorough code audits from a security perspective to ensure our applications are developed with the highest security standards. Design and manage security protocols for our edge devices, ensuring robust protection against external threats. Stay abreast of the latest cybersecurity trends and threats, applying this knowledge to fortify our defenses. This includes proactive monitoring and implementing fixes for zero-day vulnerabilities to prevent exploitation. Develop and enforce security policies and procedures, conducting security awareness training across the company to cultivate a security-first culture. Collaborate with development teams to integrate security measures into the software development lifecycle (SDLC), promoting security best practices for application development to mitigate risks from the outset. Respond swiftly to security incidents, leading the investigation and remediation efforts to minimize impact. This includes resolving security breaches and ensuring that similar vulnerabilities are addressed across all projects. We work with our partners and clients to have deep technical discussions about security posture, review and discuss the security requirements, and formulate the necessary changes for the engineering team. Manage and maintain CIS-compliant OS images for our Cloud infrastructure and field devices. Must possess demonstrable knowledge of application security, security testing methodologies, and application security testing automation. Qualifications Degree in Computer Science, Engineering, or related field. 6+ years of software engineering or equivalent experience. Experience with one of the core (Golang, Python) programming languages, scripting, and automation. Strong knowledge of encryption protocols, public/private key management, and PKI (Private Key Infrastructure). Strong understanding of network security, encryption practices, and secure coding principles. Proven experience in cloud security management (AWS, Azure, GCP). Familiarity with security policies and controls for internal corporate applications (Google Workspace, GitHub, Jira). Familiarity with security compliance standards relevant to our industry. Strong skills in managing security tools and vendor relationships. Excellent ability to develop and implement security policies and guidelines. Understanding of blockchain principles is a plus. Relevant certifications in security and cloud platforms are highly desirable. Benefits and Perks There are endless learning and development opportunities from a highly diverse and talented peer group, including experts in various fields, including Computer Vision, GenAI, Digital Twin, Government Contracting, Systems and Device Engineering, Operations, Communications, and more! Options for medical, dental, and vision coverage for employees and dependents (for US employees) Flexible Spending Account (FSA) and Dependent Care Flexible Spending Account (DCFSA) 401(k) with 3% company matching Unlimited PTO Profit sharing #J-18808-Ljbffr
    $132k-184k yearly est. 2d ago
  • Senior DevSecOps Engineer | Cloud Security for Space

    Promote Project

    Information security analyst job in San Francisco, CA

    A leading aerospace company is seeking a Senior Security Engineer to enhance their security practices. This role involves implementing security controls directly in CI/CD pipelines and requires deep experience in cloud security across AWS, Azure, or GCP. You'll work in a highly collaborative DevSecOps setup, contributing to security maturity while supporting cutting-edge space missions. Ideal candidates should possess a Master's degree in Computer Science and have proficiency in modern programming languages such as Python or Go. #J-18808-Ljbffr
    $132k-184k yearly est. 6d ago
  • Senior Security Engineer - Cloud & Edge PKI

    Echotwin Ai

    Information security analyst job in San Francisco, CA

    A leading AI-driven infrastructure firm in San Francisco is seeking an experienced Security Engineer to lead cybersecurity initiatives and manage security for their cloud environments. The role involves developing security strategies, conducting audits, and collaborating with development teams to ensure robust security practices. A degree in Computer Science and experience in cloud security are required. Competitive benefits and a dynamic work environment are offered. #J-18808-Ljbffr
    $132k-184k yearly est. 6d ago
  • Senior Corporate Security Engineer - Zero Trust & IAM Lead

    Epoch Biodesign

    Information security analyst job in San Francisco, CA

    A leading technology company is seeking a Corporate Security Engineer to safeguard data and infrastructure. The role involves managing security solutions and optimizing corporate security posture with a focus on endpoint security, IAM, and incident response. Ideal candidates should have 3-5 years of experience in security roles and a strong understanding of modern security principles. The position offers competitive compensation and benefits within a sustainable AI-first company culture. #J-18808-Ljbffr
    $132k-184k yearly est. 6d ago
  • Senior Security Engineer - Scalable Healthcare Security

    Metriport Inc.

    Information security analyst job in San Francisco, CA

    A leading data intelligence platform located in San Francisco is seeking a Senior Security Engineer to lead security initiatives and projects within the company. The ideal candidate should have over 6 years of experience in security engineering with a strong work ethic and ability to build scalable systems. You'll evangelize security practices, oversee full-stack security projects, and ensure compliance with industry standards. Competitive equity and comprehensive benefits will be offered, including health insurance and unlimited PTO. #J-18808-Ljbffr
    $132k-184k yearly est. 4d ago
  • Senior Security Engineer, Security Operations

    Goodleap, LLC 4.6company rating

    Information security analyst job in San Francisco, CA

    About GoodLeap GoodLeap is a technology company delivering best-in-class financing and software products for sustainable solutions, from solar panels and batteries to energy‑efficient HVAC, heat pumps, roofing, windows, and more. Over 1 million homeowners have benefited from our simple, fast, and frictionless technology that makes the adoption of these products more affordable, accessible, and easier to understand. Thousands of professionals deploying home efficiency and solar solutions rely on GoodLeap's proprietary, AI‑powered applications and developer tools to drive more transparent customer communication, deeper business intelligence, and streamlined payment and operations. Our platform has led to more than $30 billion in financing for sustainable solutions since 2018. GoodLeap is also proud to support our award‑winning nonprofit, GivePower, which is building and deploying life‑saving water and clean electricity systems, changing the lives of more than 1.6 million people across Africa, Asia, and South America. Position Summary The GoodLeap security team is responsible for both business enablement and safeguarding the organization's information assets; it is involved in virtually all aspects of the business, from product safety and resilience, to building security paved roads, customer, partner, and regulatory trust, managing technology governance and compliance, and ensuring the privacy, and safety of GoodLeap's customers, partners, and employees information. The senior security engineer role provides a unique opportunity to shape the security and resilience of GoodLeap systems, services, and operational processes. In this role, you will work closely with product, engineering, IT, and business teams within GoodLeap to design, build, implement, and operate security and fraud monitoring, detection, and response capabilities. Your Oversight Will Encompass Security & Fraud Monitoring, Detection, and Response: Identification of potential misuse and abuse cases, determining corresponding events associated with manifestation of such scenarios, design of identification and detection solutions -e.g., correlated/iterative event searches across log sources ranging from infrastructure to applications/SaaS platforms, testing, implementation, monitoring, and fine‑tuning of these solutions, etc. Toolset design and operations: Design and build the monitoring, detection, and response platform, from tool selection and integration - e.g., SIEM, SOAR, agentic SOC, EDR, to daily operations/management Incident Response: Play a leading role in the definition, refinement, and execution of incident response activities. Overall Security Operations: Management and operation of security platforms/solutions outside monitoring, detection, and response platform. Support Embedded Product Security Team: Design, build, and implement monitoring and detection solutions for GoodLeap products and services. Essential Job Duties & Responsibilities Lead, participate in, and contribute to security and fraud monitoring, detection, and response activities, inclusive of investigations, threat hunting, etc. Create playbooks for specific incident response scenarios. Identify potential misuse and abuse cases in enterprise systems, propose solutions to detect these scenarios, and identify and implement monitoring and detection solutions for such scenarios. Support or develop components of the security analytics platform. Support embedded (product) security team. Support general security operations team with vulnerability management, tools management, and more. Required Skills, Knowledge & Abilities Strong communicator with the ability to lead technical architecture discussions, drive technical decisions, and effectively communicate with non‑technical audiences. Expertise in security event management, monitoring, threat hunting, incident response, playbook creation, orchestration/automations, etc. Experience with threat modeling methodologies. Expertise with EDR solutions/platforms, such as CrowdStrike, S1, Palo Alto Cortex EDR, etc. Experience with AWS services, including KMS, SST, Container Registry, ELBs, Lambda, API Gateway, CloudTrail, and IAM (knowledge of GCP and/or Azure is a plus). Proven ability to establish credibility and build trust with business, engineers, and operational staff; confident yet humble. Experience designing, configuring, and implementing security and fraud monitoring for core enterprise systems, e.g., ERP, HCM, Salesforce, etc. Experience working with and creating solutions based AI and ML toolsets - e.g., creation of AI skills, agents, MCP clients, vibe coding. Strong understanding of both human and non‑human identity management and common enterprise and consumer authentication standards and use cases. Practical experience with CI/CD pipelines and DevOps tools, including Infrastructure‑as‑Code (IaC) tools like Terraform, Pulumi, or CDK; GitHub and GitHub Actions; artifact management; and secrets management tools like Doppler and HashiCorp Vault. Passionate about learning new technologies. While you're not expected to know everything, you should demonstrate a willingness and ability to learn as needed. Prior experience interfacing and supporting teams outside of security - e.g., internal product teams and other cross‑functional areas. Proficiency in writing automation scripts in multiple languages and integrating with REST/GraphQL APIs to orchestrate workflows between security tooling and third‑party cloud/SaaS platforms, automating detection, response, and operational processes. Experience engaging with vendors in design partnerships. Experience overseeing vulnerability and threat management at the platform and application levels. Familiarity with penetration testing and red team exercises, including manual verification, exploitation, and lateral movement. Ability to balance a high‑level view of security strategy with attention to detail, ensuring thorough and effective execution. $146,000 - $170,000 a year In addition to the above salary, this role may be eligible for a bonus and equity. Additional Information Regarding Job Duties and s Job duties include additional responsibilities as assigned by one's supervisor or other managers related to the position/department. This job description is meant to describe the general nature and level of work being performed; it is not intended to be construed as an exhaustive list of all responsibilities, duties and other skills required for the position. The Company reserves the right at any time with or without notice to alter or change job responsibilities, reassign or transfer job position or assign additional job responsibilities, subject to applicable law. The Company shall provide reasonable accommodations of known disabilities to enable a qualified applicant or employee to apply for employment, perform the essential functions of the job, or enjoy the benefits and privileges of employment as required by the law. If you are an extraordinary professional who thrives in a collaborative work culture and values a rewarding career, then we want to work with you! Apply today! We are committed to protecting your privacy. To learn more about how we collect, use, and safeguard your personal information during the application process, please review our Employment Privacy Policy and Recruiting Policy on AI. #J-18808-Ljbffr
    $146k-170k yearly 2d ago
  • Offensive Security Engineer, Hardware

    Openai 4.2company rating

    Information security analyst job in San Francisco, CA

    Security is at the foundation of OpenAI's mission to ensure that artificial general intelligence benefits all of humanity. The Security team protects OpenAI's technology, people, and products. We are technical in what we build but are operational in how we do our work, and are committed to supporting all products and research at OpenAI. Our Security team tenets include: prioritizing for impact, enabling researchers, preparing for future transformative technologies, and engaging a robust security culture. About the Role We're seeking an exceptional Principal-level Offensive Security Engineer to challenge and strengthen OpenAI's security posture. This role isn't your typical red team job - it's an opportunity to engage broadly and deeply, craft innovative attack simulations, collaborate closely with defensive teams, and influence strategic security improvements across the organization. You have the chance to not only find vulnerabilities but actively drive their resolution, automate offensive techniques with cutting-edge technologies, and use your unique attacker perspective to shape our security strategy. This role will be primarily focused on continuously testing our hardware products and related services. In this role you will: Collaborate proactively with engineering teams to enhance security and mitigate risks in hardware, firmware, and software. Perform comprehensive penetration testing on our diverse suite of products. Leverage advanced automation and OpenAI technologies to optimize your offensive security work. Present insightful, actionable findings clearly and compellingly to inspire impactful change. Influence security strategy by providing attacker-driven insights into risk and threat modeling. You might thrive in this role if you have: 7+ years of hands‑on experience or exceptional accomplishments demonstrating equivalent expertise. Exceptional skill in code review, identifying novel and subtle vulnerabilities. Demonstrated mastery assessing complex technology stacks, including: Proven ability to reverse engineer bootrom images, firmware, or silicon‑level components. Deep familiarity with low‑level kernel operations, secure boot processes, and hardware‑software interactions. Hands‑on experience building and validating secure boot chains and threat models. Proficiency with hardware debugging tools (UART, JTAG, SWD, oscilloscopes, logic analyzers). Solid programming skills in C/C++, Python, or assembly for embedded systems. Industry experience securing consumer hardware (e.g., mobile devices, IoT, chipsets). Excellent written and verbal communication skills for technical and non‑technical audiences. Strong intuitive understanding of trust boundaries and risk assessment in dynamic contexts. Excellent coding skills, capable of writing robust tools and automation for offensive operations. Ability to communicate complex technical concepts effectively through compelling storytelling. Proven track record of not just finding vulnerabilities but actively contributing to solutions in complex codebases. Prior experience working in tech startups or fast‑paced technology environments. Experience in related disciplines such as Software Engineering (SWE), Detection Engineering, Site Reliability Engineering (SRE), Security Engineering, or IT Infrastructure. About OpenAI OpenAI is an AI research and deployment company dedicated to ensuring that general‑purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity. We are an equal opportunity employer, and we do not discriminate on the basis of race, religion, color, national origin, sex, sexual orientation, age, veteran status, disability, genetic information, or other applicable legally protected characteristic. Qualified applicants with arrest or conviction records will be considered for employment in accordance with applicable law, including the San Francisco Fair Chance Ordinance, the Los Angeles County Fair Chance Ordinance for Employers, and the California Fair Chance Act. For unincorporated Los Angeles County workers: we reasonably believe that criminal history may have a direct, adverse and negative relationship with the following job duties, potentially resulting in the withdrawal of a conditional offer of employment: protect computer hardware entrusted to you from theft, loss or damage; return all computer hardware in your possession (including the data contained therein) upon termination of employment or end of assignment; and maintain the confidentiality of proprietary, confidential, and non‑public information. In addition, job duties require access to secure and protected information technology systems and related data security obligations. To notify OpenAI that you believe this job posting is non‑compliant, please submit a report through this form . No response will be provided to inquiries unrelated to job posting compliance. We are committed to providing reasonable accommodations to applicants with disabilities, and requests can be made via this link. At OpenAI, we believe artificial intelligence has the potential to help people solve immense global challenges, and we want the upside of AI to be widely shared. Join us in shaping the future of technology. #J-18808-Ljbffr
    $125k-175k yearly est. 2d ago
  • Lead Security Engineer

    Airbyte

    Information security analyst job in San Francisco, CA

    The Role: As the Security Engineering Lead at Airbyte, you will be the single-threaded owner of security, compliance, and privacy for the company, working in close partnership with engineering, product, legal, and leadership. This is a senior, hands-on role for someone excited to shape how security is built, embedded, and scaled in a growing company. You will have the autonomy to set direction and make risk-based decisions, along with strong cross-functional support to execute effectively. Your work will sit at the intersection of product, infrastructure, compliance, and go-to-market, with direct impact on customer trust, enterprise adoption, and Airbyte's ability to scale securely. What You'll Do: Own Airbyte's security end-to-end, spanning cloud, application, endpoint, and identity security Set security priorities and roadmaps in alignment with business goals and engineering strategy Serve as the primary security decision-maker, bringing sound judgment, context, and partnership to risk decisions and escalations Lead incident detection, investigation, and response, building clear, reliable, and repeatable processes Own and evolve Airbyte's SOC 2 Type II and ISO 27001 programs, ensuring ongoing audit readiness and operational maturity Partner with engineers to embed security into system design, architecture, and major platform initiatives Enable enterprise growth by leading customer-facing security engagements, including questionnaires, ad-hoc inquiries, and security-related contractual discussions Define and operate identity and access management, including SSO, SCIM, RBAC, and access reviews Maintain and improve Airbyte's privacy program, collaborating with Legal on privacy policies, DPAs, TIAs, and regulatory obligations Drive vulnerability management across the stack, including AWS, GCP, Kubernetes, applications, and container images Influence security culture and standards across the company as Airbyte continues to grow What You'll Need Send 3+ years of security leadership experience 5-8+ years of experience in security engineering, cybersecurity, or related roles Experience making practical, risk-based security decisions in collaboration with engineering and business partners Working knowledge of SOC 2 Type II, ISO 27001, and security governance concepts Hands-on familiarity with cloud security, Kubernetes, and modern CI/CD environments Strong communication skills, with the ability to explain security concepts to both technical and non-technical audiences Comfort balancing security, compliance, and delivery velocity in a fast-moving environment. Familiarity with privacy programs and regulations such as GDPR and CCPA Experience evaluating or applying AI-powered tools to security use cases such as detection, triage, policy analysis, or vulnerability management A mindset of curiosity, continuous learning, and shared ownership Location: Onsite 5 days/week in San Francisco, CA If you find this role exciting, we encourage you to apply even if you think you don't meet all of the requirements! Airbyte is an equal opportunity employer that does not discriminate on the basis of actual or perceived race, creed, color, religion, national origin, dicetancy, age, physical or mental disability, pregnancy, genetic information, sex, sexual orientation, gender identity or expression, marital status, familialvendicity, domestic violence victim status, veteran or military status, or any other legally recognized protected basis under federal, state or local laws. Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records. Airbyte is committed to providing reasonable accommodations for qualified individuals with disabilities in our job application procedures. Please let us know if you need assistance or accommodation due to a disability. #J-18808-Ljbffr
    $114k-163k yearly est. 2d ago
  • Lead Security Engineer - DevSecOps & Platform Resilience

    Coderabbit

    Information security analyst job in San Francisco, CA

    An innovative tech company in San Francisco is seeking a Lead Security Engineer to architect, harden, and defend its infrastructure. In this role, you'll lead security initiatives and embed security practices into the product lifecycle. Ideal candidates have over 8 years of experience in security engineering and incident response, along with a strategic mindset to manage risks effectively. This is a unique opportunity to join a fast-paced environment that values resilience and flexibility while providing a hybrid work culture. #J-18808-Ljbffr
    $114k-163k yearly est. 3d ago
  • F-35 Information System Security Officer - NAS Lemoore

    Lockheed Martin 4.8company rating

    Information security analyst job in Lemoore, CA

    What We're Doing: Lockheed Martin's, Rotary & Mission Systems (LM RMS), F-35 Cyber Security invites you to step up to one of today's most daunting challenges: the protection of exquisite government capabilities leading to warfighter supremacy against our peer and near peer adversaries. As a cybersecurity professional at Lockheed Martin, you'll safeguard the sensitive information and warfighting capabilities that our citizens and the world depend upon to protect U.S. and ally interests. Here, you'll work alongside other cybersecurity experts, related departments, and military members to support the military operational objectives by providing them with a safe and secure operating environment. In this fast-paced, real-world environment, you'll draw on all your education and experience as well as the resources of Lockheed Martin to keep these exquisite capabilities protected. The Work: This Information System Security Officer (ISSO) position will support the Information System Security Manager (ISSM) in developing, maintaining and overseeing the cybersecurity of assigned classified and/or unclassified F-35 systems at NAS Lemoore. Typical ISSO responsibilities include but are not limited to: Ensuring required cybersecurity controls are implemented and validated, to include continuous monitoring actions for assigned systems. Supporting the development and maintenance of cybersecurity related plans and procedures. Monitoring for non-compliance, anomalous activity (i.e., threats), and effectively reporting such activity and associated risks. Ensuring POA&Ms or remediation plans are in place for vulnerabilities identified during monitoring activity, audits, inspections, etc. and implementing, or overseeing, corrective actions. Creating, collecting and retaining data to meet reporting requirements. Monitoring and correlating data (i.e., events) from a variety of sources (e.g., Splunk, ELA, ePO, ACAS, etc.) to identify and mitigate threats, vulnerabilities and non-compliance. Investigating, analyzing and responding to cyber events, incidents and non-compliance, including trend analysis, creating detailed written reports and briefing the appropriate parties. Identifying, implementing and enforcing requirements for the proper handling and storage of Government data and electronic media. Conducting self-inspections and preparing for customer inspections. Interacting professionally during the enforcement of security policy and procedures. Assigned systems may vary in classification, capabilities and complexity. Mission requirements may require other than first-shift work and additional responsibilities as assigned. Who we are: Lockheed Martin is a Cyber Security pioneer, partner, innovator and builder. In support of our many customers, the amazing members of our team are responsible for providing all aspects of cybersecurity support in a complex environment. In a rapidly growing enterprise, this role offers the opportunity to grow and hone the unique skills and experiences required as a cybersecurity expert to create, design and build solutions to some of the world's hardest engineering problems. Why Join Us: Your Health, Your Wealth, Your Life With our employees as our top priority, we provide diverse career opportunities designed to propel development and boost agility. Our flexible schedules, competitive pay and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. At Lockheed Martin, we place an emphasis on empowering our employees by fostering innovation. We believe that by applying the highest standards of business ethics and visionary thinking, everything is within our reach - and yours as a Lockheed Martin employee. Lockheed Martin values your skills, training and education. Come and experience your future! #OneLMHot jobs #rmshotmiljobs Final Transferable Secret security clearance; last Periodic Reinvestigation must be within the last five (5) years or enrollment in Continuous Vetting program. Ability to obtain and maintain Special Access Program (SAP) access. Possess a valid certification that meets or exceeds DoD 8570.01-M IAT II requirements. Meets: CCNA-Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP Exceeds: CASP+ CE, CCNP Security, CISA, CISSP (or Assc), GCED, GCIH, CCSP Prior experience in a cyber workforce role, as categorized by the NICE or DoD workforce frameworks. Prior experience as an ISSO, ISSM or related DoD Cyber Workforce Role on one or more F-35 information systems. Prior experience ensuring compliance with applicable laws, regulations, guidance and policies as they relate to DoD cybersecurity and SAPs (e.g., DoDI 8510.01, JSIG, DoDM 5205.07, NIST SP 800 series). Prior experience with the system authorization process, associated artifacts and their requirements (e.g., SSP, SCTM, Security CONOPs, SOPs). Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics. The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration. * At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility. If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications. Other Important Information By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Ability to work remotely Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility. Work Schedule Information Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits. Security Clearance Information This position requires a government security clearance, you must be a US Citizen for consideration. Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $62,700 - $110,630. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. (Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year. This position is incentive plan eligible. Pay Rate: The annual base salary range for this position in most major metropolitan areas in California, Massachusetts, and New York is $72,200 - $125,005. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. This position is incentive plan eligible.
    $72.2k-125k yearly 14d ago
  • Information Security Officer (ITS)

    Usc 4.3company rating

    Information security analyst job in Parksdale, CA

    ABOUT THE DEPARTMENT The University of Southern California (USC) is advancing its cybersecurity posture with a renewed focus on resilience, cyber risk management, and threat-informed defense. As a world-class research institution, USC is building a culture of security that supports its academic and research mission in a rapidly evolving threat landscape. This role sits within a newly restructured cybersecurity organization that's leading this transformation. You'll join a team focused on scalable, proactive defense strategies, incident preparedness, and operational excellence-working alongside experts who are deeply committed to service, innovation, and impact. If you're driven by purpose, thrive in complexity, and want to help shape the future of cybersecurity at a leading university, we invite you to bring your leadership to the table. POSITION SUMMARY As the Information Security Officer (ITS) you will be an integral member of the cybersecurity department while also collaborating with stakeholders across the university ecosystem, and reporting to the ISO Manager. This is a full-time exempt position, eligible for all of USC's fantastic Benefits + Perks. This opportunity is remote The Information Security Officer (ITS) coordinates with university department, schools/units to capture and enforce cybersecurity requirements and support resiliency efforts. Facilitates a unified approach to cybersecurity safety and compliance. Participates in the development and delivery of training programs. Maintains relationships between department, schools and units and central cybersecurity leadership. Ensures leading data security practices are implemented across the university, driving awareness and completion of cyber initiatives. The Information Security Officer (ITS) will: Assists in the development, implementation and maintenance of the department, school and/or unit cybersecurity standards and procedures. Supports resiliency efforts in collaboration with university departments, schools and units to support response and recovery from cyber-related events. Participates in the setup and hardening of departmental information systems to protect against unauthorized access or attacks. Responsible for reviews of control effectiveness. Performs regular risk assessments. Assists in emergency procedures, in conjunction with relevant partners and existing cyber emergency plans, for handling security incidents, data breaches, and other critical situations. Assists in responding to security events, supporting incident response and contributing to investigations as required. Contributes to training and awareness programs for department, school/unit staff to foster understanding and adherence to cybersecurity protocols. Maintains professional currency (e.g., all relevant cybersecurity laws, regulations, policies). Encourages a workplace culture where all employees are valued, value others and have the opportunity to contribute through their ideas, words and actions, in accordance with the USC Code of Ethics. MINIMUM QUALIFICATIONS Great candidates for the position of Information Security Officer (ITS) will meet the following qualifications: 4 years of experience in IT, cybersecurity and leadership roles. A bachelor's degree or combined experience and education as substitute for minimum education. Comprehensive understanding of the cybersecurity landscape (e.g., trends, risks, best practices for risk management). Proficiency in information technology infrastructure and various cybersecurity tools and programs. Demonstrated capacity to communicate security matters to different audiences. Sound analytical and problem-solving skills with an ability to make quick decisions in emergency situations. Experience with operational technology environments and security requirements to secure OT environments. Experience with security audits and compliance with industry security standards and regulations. Strong ethical standards and a solid understanding of privacy laws, confirming confidential information will be handled with integrity. Relevant professional certifications or working towards attainment (e.g., GCIH/GSEC, CISM, CISA, CISSP, CRISC). PREFERRED QUALIFICATIONS Exceptional candidates for the position of Information Security Officer (ITS) will also bring the following qualifications or more: 7 years in IT, cybersecurity and management Leadership experience Project management skills, with experience in planning, implementing, and overseeing security-related projects. Bachelor's degree (or equivalent combination of education and experience) Demonstrated ability to lead or coordinate cybersecurity policy implementation Familiarity with audit processes and regulatory frameworks (e.g., NIST, HIPAA, FERPA) In addition, the successful candidate must also demonstrate, through ideas, words and actions, a strong commitment to USC's Unifying Values of integrity, excellence, community, well-being, open communication, and accountability. SALARY AND BENEFITS The annual base salary range for this position is $142,601.35 to $177,947.60. When extending an offer of employment, the University of Southern California considers factors such as (but not limited to) the scope and responsibilities of the position, the candidate's work experience, education/training, key skills, internal peer alignment, federal, state, and local laws, contractual stipulations, grant funding, as well as external market and organizational considerations. To support the well-being of our faculty and staff, USC provides benefits-eligible employees with a broad range of perks to help protect their and their dependents' health, wealth, and future. These benefits are available as part of the overall compensation and total rewards package. You can learn more about USC's comprehensive benefits here. Join the USC cybersecurity team within an environment of innovation and excellence. Minimum Education: Bachelor's degree Minimum Certifications: Relevant professional certifications or working towards attainment (e.g., GCIH/GSEC, CISM, CISA, CISSP, CRISC). Addtional Education Requirements Combined experience/education as substitute for minimum education Minimum Experience: 4 years in IT, cybersecurity and management. Minimum Skills: Comprehensive understanding of the cybersecurity landscape (e.g., trends, risks, best practices for risk management). Proficiency in information technology infrastructure and various cybersecurity tools and programs. Demonstrated capacity to communicate security matters to different audiences. Sound analytical and problem-solving skills with an ability to make quick decisions in emergency situations. Experience with operational technology environments and security requirements to secure OT environments. Experience with security audits and compliance with industry security standards and regulations. Strong ethical standards and a solid understanding of privacy laws, confirming confidential information will be handled with integrity. Preferred Education: Bachelor's degree Preferred Experience: 7 years in IT, cybersecurity and management. Preferred Skills: Leadership experience. Project management skills, with experience in planning, implementing, and overseeing security-related projects. USC is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability, or any other characteristic protected by law or USC policy. USC observes affirmative action obligations consistent with state and federal law. USC will consider for employment all qualified applicants with criminal records in a manner consistent with applicable laws and regulations, including the Los Angeles County Fair Chance Ordinance for employers and the Fair Chance Initiative for Hiring Ordinance, and with due consideration for patient and student safety. Please refer to the Background Screening Policy Appendix D for specific employment screen implications for the position for which you are applying. We provide reasonable accommodations to applicants and employees with disabilities. Applicants with questions about access or requiring a reasonable accommodation for any part of the application or hiring process should contact USC Human Resources by phone at **************, or by email at *************. Inquiries will be treated as confidential to the extent permitted by law. Notice of Non-discrimination Employment Equity Read USC's Clery Act Annual Security Report USC is a smoke-free environment Digital Accessibility If you are a current USC employee, please apply to this USC job posting in Workday by copying and pasting this link into your browser: *************************************************************
    $142.6k-177.9k yearly Auto-Apply 17d ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Fresno, CA?

The average information security analyst in Fresno, CA earns between $81,000 and $172,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Fresno, CA

$118,000
Job type you want
Full Time
Part Time
Internship
Temporary