Acquisition Security Analyst
Information security analyst job in Los Angeles, CA
MANTECH seeks a motivated, career and customer-oriented Acquisition Security Analyst II to join our team in El Segundo, CA.
The Acquisition Security Analyst II will assist the Government Program Manager with the development and implementation of comprehensive program protection methodologies to protect advanced technology programs throughout the system's lifecycle.
Responsibilities include but are not limited to:
In-depth lifecycle program analysis to identify critical program information (CPI), Critical System Resources (CSR), and their associated vulnerabilities. Assist with the identification and implementation of countermeasures. Develop and implement a risk management-based program protection plan and strategy.
Provide security recommendations to the PM, GSSO, and cognizant security authorities as to the Air Force acquisition and sustainment process.
Maintain a working relationship with the PM, Contracting Officer and contractor security officers to ensure a standardized and correct format/process is utilized for all DD Form 254 efforts throughout the acquisition and sustainment lifecycle, in coordination with Program Security Officers.
Conduct analysis of foreign intelligence threats against programs involving customer's critical research, sensitive technologies or CPI.
Prepare and produce analytical products from numerous resources, to include various databases, to ensure a real-time, tailored product is provided.
Write, review, and/or edit Security Classification Guides (SCG), Exposure Contingency Plans (ECP), Managed Access Plans (MAP), Security Operating Procedures (SOPs), System Test Plans (STP)
Provide technical analysis and OPSEC support to SMC or AFSPC Special programs and other associated operations, missions, and organizational elements involved in developing system requirements to associated systems RDT&E.
Minimum Qualifications:
Bachelor's degree in a related area; an additional 4 years of related experience might be considered for a degree.
10+ years of related experience with acquisition programs
6+ years of experience with SCI programs.
Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents.
Must have extensive knowledge of the DD Form 254 and how it is incorporated in the Air Force acquisition process.
Willingness to travel within the scope of the Program's Area of Responsibility (AOR) (note- could be extensive, and will include both air and ground transportation)
Preferred Qualifications:
4+ years of experience with SAR program acquisitions desired.
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision.
Have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners.
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a polygraph.
Physical Requirements:
Must be able to remain in a stationary position 50%.
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
Cyber Security Analyst
Information security analyst job in Irvine, CA
Required Skills & Experience:
Bachelor's degree in a related field preferred but not required.
5+ years of experience in a SOC or similar security environment.
Expertise with SIEM, EDR, CSPM tools; strong skills in SQL/KQL/Cypher for data analysis.
Proven ability to lead complex investigations and coordinate across technical and business stakeholders.
Solid understanding of cybersecurity frameworks (MITRE ATT&CK, NIST CSF, NIST SP800-61r3).
Experience with log aggregation technologies and SIEM tuning processes.
Job Description:
A large financial services customer based in Irvine, CA is seeking a Cyber Security Operations Analyst, focused on Incident Response. This individual will lead Incident Response, and act as a technical expert within the SOC. This team protects the organization from cyber threats. This role requires strong analytical skills, leadership in high-severity incidents, and deep knowledge of security tools and frameworks.
Pay:
50-65/hr
Director of Information Security
Information security analyst job in Santa Monica, CA
We are a specialized technology staffing agency supporting professional and financial services companies. Why do we stand out in technology staffing? We listen and act as advisors for our candidates on how they can best add value, find interesting projects, and pave a path for career advancement. We advocate for the best pay, diversity in tech, and the best job fit for every candidate we place.
Our client, a global investment firm, is seeking an experienced Director of Information Security to join their team in Los Angeles, CA!
This role will ensure compliance with industry regulations and standards, enforce robust policies, and provide strategic direction for the firm's information security roadmap. The Director will lead a team of security professionals dedicated to mitigating risks and responding to incidents, protecting the firm's systems, sensitive financial data, client information, and intellectual property from cyber threats.
Responsibilities
Develop, maintain, and enforce the firm's information security policies, procedures, and standards in accordance with legal and regulatory requirements, such as SEC, FINRA, GDPR, and any applicable financial industry regulations.
Lead and oversee the firm's information security program, including cybersecurity, identity management, risk assessment, incident response, and security awareness training.
Manage a comprehensive security strategy that includes network defenses, endpoint protection, data loss prevention, threat intelligence, and security monitoring.
Collaborate with key stakeholders to align security initiatives with business objectives and risk management strategies.
Conduct regular security audits, vulnerability assessments, and penetration tests to evaluate the effectiveness of security controls and policies.
Work closely with IT leadership to ensure the secure implementation of new technologies and the review the effectiveness of security controls and policies around existing architecture.
Lead the incident response team in managing and investigating security breaches and incidents while minimizing business impact.
Develop and oversee a vendor risk management program to ensure third-party compliance with the firm's security standards.
Collaborate with legal and compliance departments to ensure all data privacy practices align with legal requirements and to provide supporting documents for security governance programs.
Prepare and manage security budgets and forecasts, ensuring the strategic allocation of resources.
Manage, mentor and develop a team of technology and security professionals, nurturing a culture of teamwork, integrity, excellence, humor, and results.
Stay abreast of the latest security trends, threats, and technologies to maintain the firm's cyber security resiliencies and capabilities.
Regularly report to executive management and cyber security committee on the state of information security program, potential risks, and recommendations.
Develop, standardize, and maintain security documentation, including the Information Security Program, Incident Response Plan, Security Policies and Procedures, and Infrastructure Presentations.
Identify third-party vendors for security due diligence of both external and internal applications used by the firm.
Conduct account audits and sensitive data validation audits, leveraging the data classification system.
Audit and maintain records of Active Directory data ownership, distribution list memberships, and employee access and approvals.
Monitor daily security alerts, log review, and maintain records of security incidents.
Manage the documentation for Windows and third-party patching processes and security hardening measures.
Provide new hire security training, conduct monthly phishing exercises, and maintain security training documentation.
Schedule and document annual risk assessments, penetration tests, and bi-annual disaster recovery tests, including maintaining the disaster recovery notification system.
Keep the employee status roster up-to-date in coordination with HR.
Oversee the creation and maintenance of onboarding/offboarding documentation and the electronic keycard register.
Act as the firm's main point of contact for managed security service providers and vendors.
Regularly inform the firm of significant security updates and maintain ongoing security-related communications.
Qualifications
A minimum of 10 years of experience in information security, IT risk management, or related field, with at least 5 years in a leadership role.
Bachelors or master's degree in Information Security, Computer Science, Information Systems, or related field.
Professional information security certifications such as CISSP, CISM, CISA or similar.
Strong understanding of the cyber security risks associated with various technologies and ways to manage them.
Ability to present security findings and reports to key stakeholders including executive management, cyber security committee, and boards and investors.
A proven track record of developing and administering an information security program in a complex environment.
In-depth knowledge of financial industry's policies, procedures, regulations, and legislation specifically as they relate to investment management sector.
Excellent communication, leadership, and presentation skills to effectively convey complex information security topics to technical and non-technical audiences.
Demonstrated ability to collaborate, build consensus, and drive initiatives in a complex business environment.
Hands-on experience with business continuity planning, auditing, and risk management, as well as contract and vendor negotiation.
Relevant experience in information security management, governance, and operations.
Familiarity with conducting audits, risk assessments, and working within regulatory frameworks.
Experience in incident response planning, access control audits, and vendor management.
Demonstrated ability to create and conduct security training programs.
Excellent organizational skills, with the ability to manage multiple processes and maintain meticulous records.
Strong communication skills for interfacing with various departments, vendors, and key stakeholders.
Salary: $200,000 - $250,000
Security Architect
Information security analyst job in Santa Ana, CA
1. Security, Compliance and Audit Readiness
a. Enforce network security controls aligned with Criminal Justice Information Services (“CJIS”), National Institute of Standards and Technology (“NIST”), and department policy.
b. Implement and maintain firewall rulesets, Network Access Control (“NAC”) solutions (e.g., Cisco Identity Service Engine (“ISE”)), and endpoint access policies.
c. Support the cybersecurity team in incident detection, forensic analysis, and mitigation strategies.
d. Provide documentation and evidence for security audits and compliance reviews.
2. Implementation, Operations and Support
a. Serve as the hands-on engineer for network deployment, upgrades, and incident response.
b. Configure and manage Cisco switches, routers, firewalls, WLCs, and wireless endpoints.
c. Design and manage VPNs, QoS, ACLs, network monitoring, and logging systems (SolarWinds, NetFlow, SNMP).
3. SME Leadership and Staff Development
a. Serve as the department's SME on enterprise security, guiding decisions across IT, public safety systems, and operations.
b. Train, coach, and mentor internal IT staff, including junior and mid-level network technicians.
c. Lead structured knowledge transfer sessions, hands-on training, and real-time coaching during support and implementation activities.
d. Create SOPs, how-to guides, and step-by-step documentation tailored for ongoing use by internal staff.
e. Support staff in preparation for certification paths (e.g., CCNA/CCNP) if desired.
4. Any other activities reasonably related to the foregoing, as assigned by OCSD.
Security Analyst
Information security analyst job in Los Angeles, CA
We are seeking an Information Security Analyst to support enterprise security operations with a focus on vendor risk management, security control integration, and infrastructure security. This role is responsible for conducting security assessments, coordinating the implementation of core security services (including SSO, logging, IAM, and data protection), and supporting compliance activities aligned with frameworks such as NIST and ISO 27001. The ideal candidate has experience in cybersecurity risk management, cloud environments (AWS/Azure), and collaborating with technical teams to ensure the effective delivery of security controls.
At least 2+ years of experience in the following:
Security & Compliance Frameworks
NIST CSF
ISO 27001
CIS Controls
ITIL
SOC 2
PCI DSS
FedRAMP
GDPR / CCPA
Vendor Risk & GRC Tools
OneTrust
SIG (Standardized Information Gathering)
Other GRC/TPRM platforms
Identity, SSO & Access Management
SSO (PingFederate, SAML)
Active Directory
Azure AD
AWS IAM
Information Systems Security Manager (ISSM)
Information security analyst job in Torrance, CA
Castelion is bringing a new approach to defense development and production: one that focuses on short, iterative design cycles, rapid testing in development, and modern commercial manufacturing strategies for production at scale. We're designing, building, and testing next generation long range strike weapons systems to give America and its Allies a definitive edge and deter future conflicts.
Information Systems Security Manager (ISSM)
*This position requires a TS/SCI Clearance and Special Access Program Experience*
Castelion Corporation is looking for an experienced ISSM to manage and maintain the Classified Networks out of our Torrance location. The ideal candidate will be a dedicated security professional with a demonstrated ability to work independently and as a member of a team in a fast-paced, high-tech environment.
The ISSM's primary function serves as a principal expert and manager on all matters, technical and otherwise, involving the security of information systems under his/her purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, NAVY, Army, DARPA, etc. The position will provide "day-to-day" support, oversight, and maintenance for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
As the site ISSM you will own the end-to-end Information Assurance Program for all classified and controlled information systems at our Torrance facility. You will partner with Program Management, Engineering, IT, Security, and the Cognizant Security Agency (DCSA/SAPCO) to obtain and sustain ATO on schedule, mentor a growing ISSO team, and keep our environment audit ready every day.
Responsibilities
Lead RMF/JSIG/DAAPM execution architect secure solutions, prepare authorization packages, brief Security Control Assessments, and drive POA&M closure.
Own continuous monitoring vulnerability & patch management (ACAS/Nessus, SCAP, STIGs), log analysis (Splunk), account management, media control, incident response, and annual self-inspection.
Shape early program decisions embed with PMO to define security requirements, supply secure-by-design input at PDR/CDR/TRR, and influence contract CDRLs.
Develop people & process coach ISSOs/ISSEs, refine SOPs, track metrics, and present status to senior leadership and customers.
Interface with external stakeholders act as the single voice to DCSA, SAPCO, and other Cognizant Security Agencies for all cybersecurity matters.
Develop Assured File Transfer (AFT) in accordance with JSIG
Conduct all self-inspections and report findings to Cognizant Security Agency annually
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning
Maintain a and/or applicable repository for all system authorization documentation and modifications
Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents
Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements
Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed
Assess changes in the system, its environment, and operational needs that could affect the authorization
Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview
Review AIS assessment plans
Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)
Conduct periodic assessments of the security posture of the authorization boundaries
Institute and implement a Configuration Control Board (CCB) charter
Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented.
Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)
Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination
Ensure all authorization documentation is current and accessible to properly authorized individuals
Ensure that system security requirements are addressed during all phases of the system life cycle
Basic Qualifications
A degree in Science, Technology, Engineering or Mathematics (STEM), information technology and a minimum of 5 years of prior relevant experience.
5 years in DoD/IC Cybersecurity as ISSM and must meet position and certification requirements outlined in DoD Directive 8570.01-M for IAM-III within 6 months of the date of hire (CISSP, CISM, GSLC).
Proven delivery of ATO for SAP or SCI systems; prior Enterprise ISSM experience.
Active and transferable U.S. government issued Top Secret SCI (TS/SCI) security clearance required prior to start date.
Finalized CI polygraph, or willingness to submit to one
U.S. citizenship is required
Preferred Skills and Experience
Proven leadership of multi-disciplinary teams and successful ATO delivery for SAP or SCI systems
Expert knowledge of NISPOM (32 CFR 117), JSIG, RMF (NIST 800-37/-53), ICD-503, and DAAPM, oversight/execution of A&A processes.
Experience with DevSecOps pipelines, Zero Trust architecture, and Identity Access Management.
Experience executing DISA STIG/SRG hardening across Linux and Windows.
Background in network/systems security (architecture, topology, protocols, components, principles).
Hands-on with ACAS, SCAP, STIG Viewer, DISA SRGs, and SIEM/Vulnerability Tools SPLUNK, NESSUS etc.
Masters in Cybersecurity, Computer Science, or related engineering field.
CISSP-ISSEP / ISSMP or PMP.
Existing U.S. government issued Top Secret SCI (TS/SCI) security clearance within the last 24 months.
Additional Information
This is not designed to cover or contain all job duties required of the employee. There may be additional activities, duties and/or responsibilities that are required for this position that are not listed in this job description.
All employees are granted long-term stock incentives as part of their employment as Castelion. All employees receive access to comprehensive medical, vision, and dental insurance, and the company offers three weeks of paid time off per year.
Leadership Qualities
Bias to Action and Creative Problem Solving. Desire and experience questioning assumptions in ways that lead to break through ideas that are ultimately implemented. Successfully bring in applicable processes/concepts/materials from other industries to achieve efficiency gains. Ability to personally resolve minor issues in development without requiring significant support.
High Commitment, High Initiative. A successful candidate will have a genuine passion for Castelion's mission and consistently look for ways to contribute to the company's technical goals and prevent hardware blockers. Ability to work in a fast paced, autonomously driven, and demanding atmosphere. Strong sense of accountability and integrity.
Clear Communicator. Proactively communicates blockers. Trusted in previous roles to be voice of company with regulators, suppliers, gate keepers and customers. Capable of tactfully managing relationships with stakeholders to achieve company-desired outcomes without compromising relationships. Emails, IMs and verbal interactions are logical, drive clarity, and detailed enough to eliminate ambiguity.
ITAR Requirements:
· To conform to U.S. Government export regulations, applicant must be a (i) U.S. citizen or national, (ii) U.S. lawful, permanent resident (aka green card holder), (iii) Refugee under 8 U.S.C. § 1157, or (iv) Asylee under 8 U.S.C. § 1158, or be eligible to obtain the required authorizations from the U.S. Department of State.
Employment with Castelion is governed on the basis of competence and qualifications and will not be influenced in any manner by race, color, religion, gender, national origin/ethnicity, veteran status, disability status, age, sexual orientation, gender identity, marital status, mental or physical disability or any other legally protected status.
IT Security and Network Engineer
Information security analyst job in Los Angeles, CA
IT Security & Network Engineer - JM Eagle
Los Angeles, CA | Onsite 4 Days / Remote Fridays | $150,000 - $170,000 + Comprehensive Benefits
About Us
JM Eagle is the world's largest manufacturer of plastic pipe, providing the infrastructure that keeps communities connected across North America. Behind every operation is a secure, stable IT environment supporting 1,000+ users across 20+ locations.
We're strengthening that foundation - and seeking a hands-on IT Security & Network Engineer who can own our daily security operations and help modernize our network and cybersecurity posture.
This is a high-impact, individual contributor role for a senior engineer who thrives in both the strategic and technical trenches.
The Opportunity
This role is ideal for a seasoned IT security professional who wants broad ownership without stepping into management. You'll work closely with the Director of IT Operations and outsourced partners to secure our enterprise, harden our infrastructure, and enhance our cybersecurity frameworks.
Your time will be split approximately:
60% Cybersecurity: tools, monitoring, vulnerability management, incident response
40% Network Engineering: SD-WAN, firewalls, VPN, wireless, connectivity across 20+ sites
You will be the technical driver behind our security improvement roadmap.
What You'll Do
Cybersecurity Operations
Own day-to-day cybersecurity operations, including monitoring, threat response, and risk mitigation.
Manage security tools and platforms: endpoint protection, SIEM, MFA, SSO, VPN, firewalls, and vulnerability management tools.
Perform recurring vulnerability scans and penetration-testing coordination; track and validate remediation.
Monitor security alerts using Fortinet, Darktrace, CrowdStrike, Nessus, Microsoft Defender, etc.
Lead internal security awareness initiatives and social engineering simulations.
Maintain documentation for configurations, policies, and security processes.
Network Engineering
Support secure network architecture across 20+ locations.
Oversee SD-WAN, firewall policies, VPN configuration, internet filtering, and remote-access security.
Support wireless infrastructure, site connectivity, and network performance monitoring.
Partner with third-party providers to ensure uptime, reliability, and strong security posture.
Governance & Collaboration
Work with IT leadership to strengthen cybersecurity governance and reporting.
Contribute to incident response planning, tabletop exercises, and monthly security briefings.
Evaluate threats and emerging technologies; propose continuous improvements.
What You Bring
Bachelor's degree in Computer Science, Information Systems, or equivalent experience.
8+ years of experience in IT security and network engineering supporting 1,000+ users across distributed sites.
4+ years of hands-on experience with enterprise security tools and platforms.
Deep experience with the Microsoft ecosystem: Azure, M365, Active Directory / Entra ID, SCCM / Intune.
Strong working knowledge of:
MFA, SSO, VPN
Endpoint protection
SIEM solutions
Network segmentation, encryption, hardening
Monitor and respond to security alerts using tools like Fortinet, Darktrace, CrowdStrike, Nessus, and Microsoft Defender.
Familiarity with SD-WAN architectures, wireless networking, and network monitoring tools.
Understanding of ITIL, ITSM, NIST frameworks; CISSP or similar preferred but not required.
Excellent communication skills with the ability to work across teams.
Comfort managing outsourced security and network service providers.
A highly proactive, self-starting approach - someone who solves problems end-to-end.
Why JM Eagle
Directly influence and modernize the cybersecurity posture of the world's largest pipe manufacturer.
Join an enterprise undergoing major IT transformation with full executive backing.
Work with a Microsoft-centric environment supporting 1,000+ users and 20+ distributed locations.
Competitive salary: $150K-$170K + bonus + excellent benefits.
4 days onsite in Los Angeles; remote Fridays.
Work Environment
Primarily a professional headquarters environment. Occasional travel to manufacturing and distribution facilities may be required. Some exposure to plant or outdoor areas during site visits.
Senior Security Architect
Information security analyst job in Santa Ana, CA
100% On-site | Santa Ana, CA
We are seeking a Senior Security Architect to lead enterprise security operations, compliance, and infrastructure within a mission-critical environment. This hands-on leadership role combines deep Cisco networking expertise, security architecture design, and staff mentorship to ensure audit readiness and operational excellence.
Key Responsibilities:
• Enforce and maintain network security controls aligned with CJIS, NIST, and internal policy frameworks.
• Implement and manage firewall rules, NAC solutions (e.g., Cisco ISE), and endpoint access policies.
• Support incident detection, forensics, and mitigation efforts alongside cybersecurity teams.
• Lead network deployments, upgrades, and response initiatives across Cisco infrastructure.
• Configure and manage switches, routers, firewalls, WLCs, and VPNs.
• Design and optimize QoS, ACLs, and network monitoring (SolarWinds, NetFlow, SNMP).
• Act as a Subject Matter Expert (SME), mentoring internal IT staff and guiding certification readiness (CCNA/CCNP).
• Create and maintain SOPs, documentation, and training materials for ongoing operations.
Top Skills Required:
• Cisco networking (switches, routers, firewalls, WLCs, VPNs)
• Security & compliance (CJIS, NIST, NAC, audit readiness)
• Network monitoring (SolarWinds, NetFlow, SNMP, ACLs, QoS)
• Leadership & mentoring (staff training, documentation, SME guidance)
Nice-to-Have:
• Advanced CJIS/NIST compliance experience
• Public safety or government network background
• Proven mentorship and SOP development experience
#SecurityArchitect #NetworkSecurity #CiscoJobs #CJIS #NIST #Cybersecurity #SolarWinds #NetworkEngineer #OnsiteJobs #CaliforniaJobs #ITLeadership #InformationSecurity #InfrastructureSecurity
Security Architect
Information security analyst job in Torrance, CA
Cloud Security
AI Security
Container Security
Cyber Risk Assessment
Identity and Access Management (IAM)
DevSecOps
CISSP / CCSP / CISA / CCNP (Certifications)
Daily Tasks Performed:
• Security Design and Architecture: Knowledge of security design and architecture for organizational systems to meet defined cybersecurity needs; ability to embed security principles into the design goals while minimizing the risk from cyber security threats and vulnerabilities.
• Cross-functional Collaboration: Knowledge of collaborative techniques and approaches; ability to promote a culture of continuous improvement and working together across functions to solve business problems and meet business goals.
• Frameworks and Industry Standards: Knowledge of cybersecurity enterprise programs, policies, and standards to govern the organization's approach towards protecting their systems; Ability to align them with regulations, organization's context, operating environment, and cyber threats.
• Communicating Complex Concepts: Knowledge of effective presentation tools and techniques to ensure clear understanding; ability to use summarization and simplification techniques to explain complex technical concepts in simple, clear language appropriate to the audience.
• Domain Knowledge: Knowledge of a specific domain, its current trends, directions, and regulatory considerations; ability to apply domain-specific knowledge to relevant situations.
• Technical Excellence: Knowledge of a given technology and various application methods; ability to develop and provide solutions to significant technical challenges
• Cybersecurity Expertise: Knowledge of the processes, tools, and techniques in the cybersecurity domain; ability to deploy and monitor cybersecurity measures, while detecting, controlling, and preventing cybersecurity breaches.
What this person will be working on:
This is a Security architect role and will include Cloud Security, AI Security, endpoint security, Network security and other security domain areas as needed
Position Success Criteria (Desired) - 'WANTS'
Qualification:
IS related bachelor's degree and/or equivalent work experience.
5+ years of IT business work experience
Desired Certifications: CISSP, CCSP, CCNP, CISA, or equivalent are highly desirable
• Problem Solving: Knowledge of approaches, tools, techniques for recognizing, anticipating, and resolving organizational, operational or process problems; ability to apply knowledge of problem solving appropriately to diverse situations.
• Conceptual Thinking: Knowledge of thinking and reasoning at a conceptual level; ability to identify the critical ideas and interdependencies among system elements that impact performance.
• Cloud Security: Knowledge of tools, technologies, and processes of cloud security; ability to minimize security risks to secure cloud computing services.
• Container Security: Knowledge of containerization technologies, secure image practices, runtime security, secure networking, and incident response; ability to design, develop, and implement secure container environments, while assessing risks, leading audits, and advocating for best practices, enables effective protection of containerized environments.
• AI Security: Designs secure architectures for Gen AI systems with a focus on threat modeling, data protection, and adversarial risk mitigation. Ensures secure deployment, access control, and compliance with AI governance and regulatory standards. Collaborates cross-functionally to embed security across the AI/ML lifecycle. Knowledge of tools, technologies related to AI development and security.
• Cyber Risk Assessment and Mitigation: Knowledge of cyber risk assessment and mitigation strategies across the systems' life cycle; ability to assess risks timely and propose countermeasures.
• Threat Analysis and Defense: Knowledge of characteristics, behaviors, capabilities, intent, and interactions of incoming cyber threats; ability to analyze the threats and develop defense and mitigation strategies to effectively combat such threats.
• Identity and Access Management: Knowledge of security administration; ability to manage access to computers, infrastructure, networks, and applications.
• DevSecOp: Knowledge of concept, principles, methodologies of DevSecOps; ability to utilize related tools and techniques to integrate security into DevOps processes.
IT Security Analyst
Information security analyst job in Buena Park, CA
The IT Security Analyst is responsible for developing, implementing, and managing security measures across multiple functional areas including core infrastructure, data, network, systems, and web applications. This role supports the creation and enforcement of security policies and procedures, monitors for threats and vulnerabilities, and assists in incident response and risk analysis. The analyst will collaborate with IT and business units to ensure the organization's security posture aligns with strategic goals and regulatory requirements.
DUTIES
Monitor and analyze security threats including viruses, malware, phishing attempts, and suspicious system activity across firewalls, IDS, VPN, email filters, and web filters.
Reports adverse security events and risk assessments to the Information Security Officer and Chief Information Officer
Administer and enforce security policies by managing user access, reviewing violation reports, investigating anomalies, and maintaining documentation of security controls.
Provide end-user support for security-related issues including malware infections, phishing attempts, and safe browsing practices.
Evaluate and recommend security tools, technologies, and procedures to improve protection and operational efficiency.
Educate IT staff and business units on security policies and best practices; consult on security implications of user-managed systems and applications.
Participate in IT projects to ensure the security requirements are integrated into system design and implementation.
Support the organization's IT strategic plan by delivering secure technology solutions that meet the business objectives.
Ensures compliance with internal policies, regulatory requirements, and industry standards.
QUALIFICATIONS
EDUCATION: Bachelor‘s Degree in Computer Science, Information Systems, or other related field. Or equivalent work experience.
EXPERIENCE: 3 to 5 years of combined IT and security experience with a broad range of exposure to systems analysis, application development, database design and administration; one to two years of experience with information security.
SKILLS/ABILITIES
Strong understanding of security principles, technologies, and practices across diverse platforms.
Hands-on experience with configuring and securing workstations, laptops, mobile devices, servers, printers, switches, and other peripherals.
Familiarity with banking applications such as Fiserv, Jack Henry, or FIS.
Excellent verbal and written communication skills with the ability to convey complex technical concepts to non-technical audiences.
Demonstrated problem-solving, analytical thinking, and decision-making skills.
Strong customer service orientation and interpersonal skills.
Security certifications (e.g. CompTIA Security+, CEH, GCIH) are a plus.
Applicants must be authorized to work in the United States without the need for visa sponsorship now or in the future.
WHY WORK FOR US?
Since opening our first branch in Los Angeles in 2008, Royal Business Bank (RBB) has grown rapidly by adding branches in Southern California, Nevada, New York, New Jersey, Chicago and Hawaii. We offer a comprehensive and innovative suite of banking services for individuals and businesses.
We have great benefits that include, but not limited to:
Medical insurance
Vision insurance
Dental insurance
401(k)
Disability insurance
Royal Business Bank may collect personal information from potential job candidates and applicants. For more information on how we handle personal information and your applicable rights, please review our Privacy Policies
(GLBA Privacy Notice, California Consumer Privacy Act and Online Privacy) at our website ****************************
.
Royal Business Bank is an Equal Employment Opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, age, national origin, protected veteran status, disability status, sexual orientation, gender identity or expression, marital status, genetic information, or any other characteristic protected by law.
Sr. Security Engineer
Information security analyst job in Orange, CA
(Salary Range: $125,000 - $143,000 annually DOE)
Purpose of Position: This position is responsible for maintaining and improving the security of the organization's information systems, networks, and data. Key responsibilities include proactively identifying potential security risks, developing and implementing security measures to prevent data loss.
Essential Functions:
• Perform active threat hunting, looking for potential attacks rather than just passively waiting for attacks
• Perform red team/blue team exercises to test defenses and improve security operations.
• Assists with vulnerability assessments, using provided security tools to identify system vulnerabilities
• Design and implement security controls across cloud and on-premises environments
• Create and maintain security monitoring and alerting solutions
• Data Loss Prevention (DLP): Monitor DLP alerts, investigate incidents, and recommend actions to relevant teams to mitigate data breaches.
• Assists in the planning and deployment of the company's cloud information security strategies
• Manage Infrastructure and application security monitoring tools to detect and respond to security incidents in real-time
• Participate in the development and improvement of the company's SDLC processes, ensuring security practices are integrated into all stages of product development
• Responsible for evaluating, influencing, and recommending technology and product direction
• Stay informed on the latest cybersecurity trends, emerging threats, attack techniques, and zero-day vulnerabilities affecting Microsoft environments and other relevant technologies.
• On-site or remote regular attendance and punctuality are essential functions of the job.
• Perform other business tasks or functions as assigned.
Knowledge, Skills & Abilities Required:
• Experience with Microsoft Defender, Sentinel, Azure Security Center, and Microsoft 365 security solutions, helping to identify vulnerabilities, mitigate threats, and enhance security postures.
• Deep knowledge of Microsoft security solutions
o Microsoft Defender for Endpoint
o Microsoft Sentinel (SIEM/SOAR)
o Azure Security Center & Microsoft Purview Compliance Manager
o Microsoft Intune and Conditional Access Policies
• Strong understanding of security principles and best practices
• Strong knowledge and hands on experience with Data Loss Prevention
• Hands-on experience in threat hunting
• Certifications such as OSCP, OSWE, CISSP, CEH, GPEN, AZ-500 (Microsoft Azure Security Engineer), SC-200 (Microsoft Security Operations Analyst), or SC-300 (Microsoft Identity and Access Administrator) are a plus.
• Proficiency in Microsoft security technologies and tools such as Purview Information Protection, Defender for Cloud and Sentinel
• Experience with Managed Extended Detection and Response (MXDR)
• Proficient in Microsoft Office programs, including Word, Excel, PowerPoint, as well as Outlook.
• Adhere to all PHI (Protected Health Information) and HIPAA (Health Insurance Portability and Accountability Act) guidelines.
Educational Requirements:
• High School Diploma or equivalent required.
• Bachelor's degree in Computer Science, Cyber Security or equivalent experience required.
• Minimum of six (6) years of hands-on experience in IT with a focus on security.
Physical Requirements: Must be able to sit for extended periods and occasionally stand and walk. Must have adequate hearing for phone work. Vision requirements include close vision and the ability to adjust focus. Must be able to communicate effectively in English. Must be able to use a keyboard and other office equipment. Ability to lift up to 10 pounds occasionally.
IT Operations Analyst II
Information security analyst job in Los Angeles, CA
Operations Analyst II (Systems Administrator)
**MUST HAVE LAW FIRM EXPERIENCE**
The Operations Analyst II plays a key role in supporting and maintaining the Firm's applications-both cloud-based and on-premise. This position works closely with the IT Operations Manager and Director of Information Technology, collaborating across the IT team to ensure application stability, innovation, and performance. The Analyst also provides advanced support to Help Desk staff and end users.
Key Responsibilities:
Diagnose and resolve application errors across cloud and on-premise environments.
Collaborate with IT Operations to implement solutions and improve system reliability.
Deploy, integrate, and manage Firm applications using tools like SCCM, Intune, and Ivanti.
Oversee application lifecycle management and communicate upcoming changes.
Provide tier-2 escalation support and participate in after-hours/on-call rotations.
Assist with account provisioning and decommissioning (Active Directory, Exchange Online).
Maintain and support Active Directory infrastructure.
Ensure timely patching and address Windows security vulnerabilities.
Create and maintain system documentation and support protocols.
Conduct quality assurance testing for application reliability.
Build and manage vendor and consultant relationships.
Contribute to technology evaluations and recommendations.
Lead small to mid-sized projects independently.
Support training material development for Firm applications.
Perform other duties as assigned.
Core Competencies:
Collaboration: Builds strong partnerships across teams.
Trustworthiness: Demonstrates integrity and authenticity.
Customer Focus: Delivers user-centric solutions.
Results-Driven: Achieves goals under pressure.
Adaptability: Adjusts to changing demands with ease.
Resourcefulness: Uses tools and time efficiently.
Initiative: Tackles challenges with energy and urgency.
Tech-Savvy: Embraces digital innovation.
Required Skills & Experience:
Strong knowledge of:
Microsoft 365 (Office 365, SharePoint Online, Exchange Online, Dynamics, Power Automate)
Azure and Entra ID
Windows 11 and Windows Server OS
PowerShell scripting
Cloud collaboration tools (e.g., OneDrive, Box)
Remote desktop technologies (AVD, Citrix, RDP, BeyondTrust)
Application deployment tools (Intune, Endpoint Manager, MSI packaging)
Metadata management software
Tools Used:
Microsoft 365 Suite
Windows 11 & Server OS
Azure & Entra ID
Data ETL tools
Qualifications:
High school diploma or GED
3-6 years of technical experience in large environments (300+ users)
Project management experience with small to mid-sized initiatives
Strong organizational and communication skills
Ability to prioritize tasks and meet deadlines
Professional demeanor with internal and external stakeholders
Quick learner with a passion for technology
Willingness to travel (up to 10%) and work flexible hours as needed
All qualified applicants will receive consideration for employment without regard to race, color, national origin, age, ancestry, religion, sex, sexual orientation, gender identity, gender expression, marital status, disability, medical condition, genetic information, pregnancy, or military or veteran status. We consider all qualified applicants, including those with criminal histories, in a manner consistent with state and local laws, including the California Fair Chance Act, City of Los Angeles' Fair Chance Initiative for Hiring Ordinance, and Los Angeles County Fair Chance Ordinance. For unincorporated Los Angeles county, to the extent our customers require a background check for certain positions, the Company faces a significant risk to its business operations and business reputation unless a review of criminal history is conducted for those specific job positions.
System Engineer/IT Advisor - MSP
Information security analyst job in La Verne, CA
📍 Base: Client base is in LA and HQ is in La Verne, CA
💰 $130 to $140K + Bonus + Benefits
We're seeking a System Engineer/ Consultative to join a growing Managed Services Provider (MSP). This role blends advanced technical expertise with consultative, client-facing responsibilities. You'll resolve high-level escalations, lead infrastructure projects, and identify opportunities to upsell solutions that truly add value for clients.
What You'll Do:
Own L3 escalations across server, cloud, and networking environments
Design and implement solutions (Azure, M365, VMware, SonicWall, etc.)
Act as a trusted advisor to clients, aligning IT with business goals
Spot upsell opportunities and work with leadership to close deals
Mentor junior engineers and help shape best practices
What We're Looking For:
4+ years MSP experience (required)
Advanced knowledge of Microsoft Server, Azure, M365, AD, VMware, and networking
Strong client-facing, consultative approach
Proven ability to upsell or expand client accounts through solutions
Perks & Benefits:
✅ Competitive salary + bonus
✅ Medical, Dental, Vision, 401(k) + 5% match
✅ PTO + Holidays
✅ Clear upward mobility and leadership growth
✅ Paid parking
Application Security Engineer
Information security analyst job in Manhattan Beach, CA
WHO WE ARE:
Headquartered in Southern California, Skechers-the Comfort Technology Company -has spent over 30 years helping men, women, and kids everywhere look and feel good. Comfort innovation is at the core of everything we do, driving the development of stylish, high-quality products at a great value. From our diverse footwear collections to our expanding range of apparel and accessories, Skechers is a complete lifestyle brand.
ABOUT THE ROLE:
Skechers is seeking a passionate Application Security Engineer to join our team and serve as a security champion who bridges the gap between development and security operations. This role is critical to strengthening our security posture by embedding security practices throughout the software development lifecycle and fostering a security-first culture across our development teams.
The ideal candidate will be a hands-on security professional who thrives on collaboration, enjoys mentoring developers, and has the technical expertise to identify vulnerabilities while providing practical remediation guidance. You will play a pivotal role in scaling our application security program and ensuring our applications are secure by design.
WHAT YOU'LL DO:
Successfully integrate security practices into development workflows, resulting in measurable reduction of security vulnerabilities in production applications
Conduct thorough security-focused code reviews that identify critical vulnerabilities while providing actionable feedback to development teams
Establish and implement efficient processes for triaging, prioritizing, and tracking remediation of security findings with clear SLAs and accountability measures
Enhance developer engagement through proactive security awareness initiatives, building trusted relationships that enable developers to implement secure coding practices throughout the development process.
Assist with management and optimization of SAST, DAST, OSS, WAF, and other application security tools to maximize coverage and minimize false positives
Provide analysis and support as needed during security incidents to contribute to faster resolution times
WHAT YOU'LL BRING:
Proficiency with application security tools including SAST, DAST, dependency scanning, and WAF technologies
Strong understanding of common web application vulnerabilities (OWASP Top 10) and secure coding practices
Experience with at least one programming language (Java, Python, JavaScript, C#, or similar)
Knowledge of API security, authentication mechanisms, and authorization frameworks
Familiarity with DevSecOps practices and CI/CD pipeline integration
REQUIREMENTS:
3-5 years of hands-on application security experience with demonstrated expertise in secure code review
Retail or e-commerce experience a plus
The pay range for this position is $110,000-$155,000/yr USD.
Cyber Security Analyst
Information security analyst job in Costa Mesa, CA
The Orange County Department of Education (OCDE) serves some of Orange County's most vulnerable student populations and provides support and mandated fiscal oversight to 28 school districts serving more than 600 schools and approximately 475,000 students. In addition to providing direct instruction to students through its own alternative and special education programs, OCDE administers an array of programs and services that are critical to the operations of local school districts and community colleges, facilitating professional development, legal guidance, payroll, career and technical education support, high-speed internet access, Local Control and Accountability Plan assistance and approval, resources for families, and student enrichment. OCDE's vision is that "Orange County students will lead the nation in college and career readiness and success." Department staff are working to achieve this goal in collaboration with educators at all levels of student development, from early childhood through higher education, and in partnership with families, businesses and community organizations.
See attachment on original job posting
Education and Experience: Any combination of education and experience that would likely provide the required knowledge and abilities is qualifying. A typical way to obtain the knowledge and abilities would be: • Bachelor's degree or equivalent from an accredited college or university with major course work in information security, or a related field. • One to two years of experience in information security technology, specifically with penetration testing, intrusion detection, incident response, or digital forensics; or an equivalent combination of training and experience.
There are supplemental questions in the application. Please note that the EdJoin system will time-out after a 20-minute period of perceived inactivity. To assist you in the preparation of your application, the supplemental questions are listed here. Your responses should be thoughtful and thorough, and within the limit of 5,000 characters or less. We recommend that you prepare your responses in advance of beginning the application. 1. Explain a cybersecurity framework or methodology you know and how you have applied it in a previous role or project. 2. Describe your approach to investigating and assessing cybersecurity events and incidents. How do you prioritize incidents, and what criteria do you use to determine severity and impact? 3. Why are you passionate about pursuing a career in cybersecurity, and how do you stay current with the latest trends and developments in the field? Notice to Applicants: If you require accommodations in the application process, please inform us.
Education and Experience: Any combination of education and experience that would likely provide the required knowledge and abilities is qualifying. A typical way to obtain the knowledge and abilities would be: • Bachelor's degree or equivalent from an accredited college or university with major course work in information security, or a related field. • One to two years of experience in information security technology, specifically with penetration testing, intrusion detection, incident response, or digital forensics; or an equivalent combination of training and experience.
There are supplemental questions in the application. Please note that the EdJoin system will time-out after a 20-minute period of perceived inactivity. To assist you in the preparation of your application, the supplemental questions are listed here. Your responses should be thoughtful and thorough, and within the limit of 5,000 characters or less. We recommend that you prepare your responses in advance of beginning the application. 1. Explain a cybersecurity framework or methodology you know and how you have applied it in a previous role or project. 2. Describe your approach to investigating and assessing cybersecurity events and incidents. How do you prioritize incidents, and what criteria do you use to determine severity and impact? 3. Why are you passionate about pursuing a career in cybersecurity, and how do you stay current with the latest trends and developments in the field? Notice to Applicants: If you require accommodations in the application process, please inform us.
Comments and Other Information
Resumes will not be accepted in lieu of the completed online application. Before receiving authorization to work in this position, the individual selected will be required to provide a current negative TB authorization, within the last 60 days, and submit fingerprints for the purpose of conducting a confidential background investigation and record check. The tests are arranged and paid for by OCDE. The Immigration Reform and Control Act of 1986 requires employers to verify the employability of all new employees. Before the Department will finalize an offer of employment, the candidate selected will be required to show original documents which establish both the individual's identity and employment authorization. The candidate must also sign a statement under penalty of perjury regarding his/her employability. We reserve the right to reopen, readvertise, or delay filling this position. AA/EOE/ADA
Information Security Analyst
Information security analyst job in Glendale, CA
We're seeking a highly skilled and experienced Information Security Analyst with a strong foundation in SIEM, Asset management, Network tools, and a comprehensive understanding of cybersecurity principles. The ideal candidate will be responsible for ensuring the security, integrity, and reliability of our endpoints and network infrastructure while proactively identifying and mitigating potential security risks and vulnerabilities.[1]
Responsibilities:
● Network Security Management: Monitor network traffic for potential threats, intrusions, and vulnerabilities.
● Cybersecurity Strategy: Develop and execute comprehensive cybersecurity strategies aligned with industry best practices and compliance standards. Evaluate existing security measures and recommend enhancements to fortify the network infrastructure against evolving threats.
● Incident Response and Resolution: Lead incident response efforts, investigating and resolving security breaches, vulnerabilities, and incidents. Implement proactive measures to prevent future occurrences and maintain network continuity.
● Technical Expertise: Utilize expertise in SIEM, Asset Management, and Network tools to configure, troubleshoot, and optimize endpoints and network security devices and solutions. Collaborate with cross-functional teams to integrate security tools effectively.
● Risk Assessment and Compliance: Conduct regular risk assessments, pen-tests and security audits to identify vulnerabilities and compliance gaps. Implement corrective actions and security controls to ensure adherence to industry regulations and company policies. Lead our yearly SOC 2, Type 2 Audit.
● Documentation and Reporting: Maintain accurate documentation of our incidents, policies, and procedures. Generate detailed reports and present findings to stakeholders, outlining security posture, vulnerabilities, and recommended actions.
● Team Collaboration and Leadership: Work closely with the IT team, providing guidance, mentorship, and technical expertise. Collaborate on projects, initiatives, and security-related tasks to enhance the overall security posture of the organization.
Requirements:
● Bachelor's degree in Computer Science, Information Technology, or related field (or equivalent work experience).
● Extensive experience (4+ years) as a Network Security Analyst.
● Professional certifications such as CISSP, or relevant industry certifications are desirable.
● Proficiency in configuring, managing, and troubleshooting SIEM, Asset Managers, and similar tools
● Deep understanding of cybersecurity principles, network protocols, and security technologies.
If you are passionate about information security and are driven by the challenge of safeguarding critical infrastructures from cyber threats, we'd love to speak with you!
update this with the title and responsibilities
Auto-ApplyManager, Information Security, Productions
Information security analyst job in Culver City, CA
The Information Security organization at Sony Pictures Entertainment is responsible for protecting our content, systems, and data from being stolen, damaged, or destroyed. To do so, we are continuously improving our tools, capabilities, and processes to stay ahead of evolving threats.
The Manager, Information Security Productions is accountable for operationalizing the Information Security Productions program across all SPE U.S. productions. This includes driving consistent implementation of approved security standards, tools, and controls; ensuring data-driven visibility into production security risk; and supporting compliance and readiness reporting to leadership. Success in this role requires strong cross-functional collaboration across Information Security, IT, S3, and production teams to embed security into creative workflows without friction, while ensuring protection of SPE's most valuable assets-our stories and intellectual property.
This role will also ensure program consistency with regional and global counterparts, contribute to automation and standardization of key controls, and support ongoing improvement of information security for productions practices across the production lifecycle.
Key indicators of success in this role will be:
+ Business leaders have near real-time visibility into production information security risk using meaningful, actionable metrics that drive timely and effective decision-making.
+ Consistent application of approved tools, workflows, and controls across productions, ensuring compliance and readiness reporting aligns with studio KPIs.
+ Production teams trust SPE to provide a secure, highly available, and easy-to-use digital production environment that safeguards our content and data.
+ Information Security, Physical Security, and IT operate as unified partners to protect SPE productions from concept to archive.
Within this organization, we value learning, agility, and collaboration. The Manager, Information Security Productions (CC, US) will be a key contributor to Sony Pictures Entertainment's goal of being the most trusted studio in the industry.
Responsibilities
Provide visibility and actionable insight into Information Security risk across active U.S. productions.
+ Monitor, analyze, and report on production security posture and key control performance metrics for each production.
+ Partner with global InfoSec, Risk, Threat Intelligence, Incident Response, Training, and Governance teams to align production needs with enterprise programs.
+ Prepare and present dashboards and reports on security trends, compliance status, and improvement opportunities.
+ Support the development of production-specific metrics and KPIs to measure control effectiveness.
+ With IT and Physical Security, maintain security controls in place for productions to most effectively meet our business goals.
Operationalize the Production Information Security Program across U.S. productions.
+ Ensure consistent implementation of approved security tools, policies, and workflows within productions.
+ Coordinate adoption of automated controls with productions, such as provisioning, watermarking, and access telemetry.
+ Support the standardization and scalability of production security practices across production titles and business units.
Ensure and track production security culture, awareness, and response readiness.
+ Amplify the reach of security training and awareness initiatives by coordinating rollout to productions, ensuring consistent messaging and participation tracking.
+ Gather feedback from productions to help refine information security for productions training and awareness efforts.
+ Partner with Incident Response to ensure clear communications, timely follow-up, and closure of corrective actions.
+ Track cultural and operational readiness indicators (e.g., onboarding rates, reporting engagement, post-incident improvements) to measure program maturity and continuous improvement.
Qualifications
+ 5+ Years of experience in Information Security, Information Technology or a related field
+ 5+ Years of experience in an organization directly involved in movie, television and/or other entertainment production, or equivalent educational experience.
+ Bachelor's degree preferred
+ Strong understanding of the technologies, tools and processes used in production of movies and/or television.
+ Knowledge of Information Security frameworks, standards and best practices and their relevance to business success
+ Specific knowledge of processes, tools and practices used to maintain confidentiality in the context of movie and television productions.
+ Ability to develop and maintain meaningful metrics to track program and process effectiveness.
+ Strong planning and analytical skills
+ Strong communications skills
Sony Pictures Entertainment is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, national origin, disability, veteran status, age, sexual orientation, gender identity, or other protected characteristics. To request an accommodation for purposes of participating in the hiring process, you may contact us at SPE_Accommodation_Assistance@spe.sony.com.
Manager, Information Security Compliance
Information security analyst job in Santa Monica, CA
Department Description At Disney, we're storytellers. We make the impossible, possible. The Walt Disney Company (TWDC) is a world-class entertainment and technological leader. Walt's passion was to continuously envision new ways to move audiences around the world-a passion that remains our touchstone in an enterprise that stretches from theme parks, resorts and a cruise line to sports, news, movies and a variety of other businesses. Uniting each endeavor is a commitment to creating and delivering unforgettable experiences - and we're constantly looking for new ways to enhance these exciting experiences.
The Enterprise Technology mission is to deliver technological solutions that align to business strategies while enabling enterprise efficiency and promoting cross-company collaborative innovation. Our group drives competitive advantage by enhancing our consumer experiences, enabling business growth, and advancing operational excellence.
The Global Information Security (GIS) organization strives to secure the magic by employing best-in-class services to assess, prevent, detect, and respond to cyber threats that present risk to The Walt Disney Company. We enable the business by integrating enterprise and business segment-specific supported services to create a robust, efficient, and adaptable cybersecurity program. Our key objectives are to:
* Secure the Magic by protecting information systems and platforms.
* Reduce Risk by proactively assessing, preventing, and detecting to prevent harm to the Company and our Guests.
* Strengthen the business through optimizing execution, application, and technology used to protect the Company.
* Innovate by investing in core capabilities to enhance operational efficiency.
Team Description:
Global Information Security (GIS) supports all of Disney's business segments, including Disney Entertainment & ESPN (DE&E). DE&E encompasses the operations of Disney's streaming services-Disney+, Hulu, ESPN+, Disney+ Hotstar, Star, and the upcoming Venu Sports streaming service-as well as Disney's broadcast and cable networks, including ABC, ESPN, FX, Disney Channels, and National Geographic. DE&E sits at the intersection of entertainment, sports, and technology, striving to connect viewers with beloved stories while advancing the streaming industry with consumer-first innovations. Security professionals supporting DE&E work with industry-leading technologies to deliver world-class, highly secure services to customers.
What You'll Do:
* Independent audit support for:
* SOX 404 ITGCs
* PII
* PCI
* ISPS
* Collaborate with Enterprise Controls and Compliance (ECC) to scope systems and respective ITGCs.
* Perform control health checks and remediation testing procedures to address issues identified via audit assessments, access control reviews, internal or external audits and/or other assessments.
* Develop and lead the Control Assurance Programs (ISPS and SOX).
* Lead Audit Readiness efforts to ensure proper system scoping and respective ITGCs, control validations and timely program onboarding.
* Participate in audit walkthrough meetings to help establish internal testing procedures to gain operational comfort in the design of the Company's automated controls.
* This includes control self-evaluations of new controls or processes that impact the effectiveness of an existing control.
* Perform impact analysis and risk assessment on deficiency findings and documentation associated with the assessment.
* Work with management and internal audit on maintaining the master Risk and Control Matrix over the systems material to Disney Entertainment and ESPN (Broadcast TV and Streaming - Hulu, Disney+, ESPN+, STAR+ products)
* Ensure for timely management response of audit findings into our corporate SOCD/SAD.
* Oversee ISPS Management Audit coordination and open action plans.
* Provide consultancy to Development leads to identify and implement automation and efficiency opportunities to meet governance and compliance demands.
* Management of GRC workflows around coordination of certifications and attestations.
* Partner with leadership to support the PCI-DSS compliance program.
* Develop training materials, coordinate training sessions, and monitor compliance with training requirements.
* Oversee and manage a team of compliance analysts, ensuring day-to-day operations run smoothly and efficiently.
* Assign tasks and projects to team members based on priorities, deadlines, and individual strengths.
* Provide executive level updates on Compliance programs
Must Haves (Years of Experience, languages, programs, tools, etc.):
* Minimum of 8 years of related work experience, with 3 in management roles
* IT SOX experience and proven experience in supporting IT audit/compliance functions
* Experience in managing people
* Thorough understanding of SOX ITGC and ICFR 404 standards and audit objectives
* Interpersonal skills with the ability to work with teams cross-functionally
* Strong verbal and written communication skills and ability to effectively communicate to technical and non-technical audiences, including developers and tech operators
* Detail-oriented but able to understand the big picture. Highly organized and efficient
* Ability to navigate through ambiguity, manage and coordinate multiple project assignments simultaneously in a fast-paced, deadline-driven environment, accepting ownership and accountability of the process and deliver on commitments
* Experience with cloud-based services, specifically AWS
Nice To Haves (see above):
* Experience and knowledge of NIST framework, ISO 27001, K-ISMS, GDPR
* Experience working with companies that have a heavy microservice architecture
Education:
Bachelor's degree in Computer Science, CPA license, Information Systems, Software, Electrical or Electronics Engineering, or comparable field of study, and/or equivalent work experience
The hiring range for this position in Glendale, CA and Santa Monica, CA is $141,900 to $190,300 per year and in New York, NY is $148,700 to $199,400 per year. The base pay actually offered will take into account internal equity and also may vary depending on the candidate's geographic region, job-related knowledge, skills, and experience among other factors. A bonus and/or long-term incentive units may be provided as part of the compensation package, in addition to the full range of medical, financial, and/or other benefits, dependent on the level and position offered.
About The Walt Disney Company (Corporate):
At Disney Corporate you can see how the businesses behind the Company's powerful brands come together to create the most innovative, far-reaching and admired entertainment company in the world. As a member of a corporate team, you'll work with world-class leaders driving the strategies that keep The Walt Disney Company at the leading edge of entertainment. See and be seen by other innovative thinkers as you enable the greatest storytellers in the world to create memories for millions of families around the globe.
About The Walt Disney Company:
The Walt Disney Company, together with its subsidiaries and affiliates, is a leading diversified international family entertainment and media enterprise that includes three core business segments: Disney Entertainment, ESPN, and Disney Experiences. From humble beginnings as a cartoon studio in the 1920s to its preeminent name in the entertainment industry today, Disney proudly continues its legacy of creating world-class stories and experiences for every member of the family. Disney's stories, characters and experiences reach consumers and guests from every corner of the globe. With operations in more than 40 countries, our employees and cast members work together to create entertainment experiences that are both universally and locally cherished.
This position is with Disney Worldwide Services, Inc., which is part of a business we call The Walt Disney Company (Corporate).
Disney Worldwide Services, Inc. is an equal opportunity employer. Applicants will receive consideration for employment without regard to race, religion, color, sex, sexual orientation, gender, gender identity, gender expression, national origin, ancestry, age, marital status, military or veteran status, medical condition, genetic information or disability, or any other basis prohibited by federal, state or local law. Disney champions a business environment where ideas and decisions from all people help us grow, innovate, create the best stories and be relevant in a constantly evolving world.
Apply Now Apply Later
Current Employees Apply via My Disney Career
Explore Location
Senior Security Architect
Information security analyst job in Orange, CA
Security, Compliance and Audit Readiness:
Enforce network security controls aligned with Criminal Justice Information Services (“CJIS”), National Institute of Standards and Technology (“NIST”), and department policy.
Implement and maintain firewall rulesets, Network Access Control (“NAC”) solutions (e.g., Cisco Identity Service Engine (“ISE”)), and endpoint access policies.
Support the cybersecurity team in incident detection, forensic analysis, and mitigation strategies.
Provide documentation and evidence for security audits and compliance reviews.
Implementation, Operations and Support:
Serve as the hands-on engineer for network deployment, upgrades, and incident response.
Configure and manage Cisco switches, routers, firewalls, WLCs, and wireless endpoints.
Design and manage VPNs, QoS, ACLs, network monitoring, and logging systems (SolarWinds, NetFlow, SNMP).
SME Leadership and Staff Development:
Serve as the department's SME on enterprise security, guiding decisions across IT, public safety systems, and operations.
Train, coach, and mentor internal IT staff, including junior and mid-level network technicians.
Lead structured knowledge transfer sessions, hands-on training, and real-time coaching during support and implementation activities.
Create SOPs, how-to guides, and step-by-step documentation tailored for ongoing use by internal staff.
Support staff in preparation for certification paths (e.g., CCNA/CCNP) if desired.
Any other activities reasonably related to the foregoing, as assigned by the Client
IT Operations Analyst II
Information security analyst job in Los Angeles, CA
Operations Analyst II (Systems Administrator)
**MUST HAVE LAW FIRM EXPERIENCE**
The Operations Analyst II plays a key role in supporting and maintaining the Firm's applications-both cloud-based and on-premise. This position works closely with the IT Operations Manager and Director of Information Technology, collaborating across the IT team to ensure application stability, innovation, and performance. The Analyst also provides advanced support to Help Desk staff and end users.
Key Responsibilities:
Diagnose and resolve application errors across cloud and on-premise environments.
Collaborate with IT Operations to implement solutions and improve system reliability.
Deploy, integrate, and manage Firm applications using tools like SCCM, Intune, and Ivanti.
Oversee application lifecycle management and communicate upcoming changes.
Provide tier-2 escalation support and participate in after-hours/on-call rotations.
Assist with account provisioning and decommissioning (Active Directory, Exchange Online).
Maintain and support Active Directory infrastructure.
Ensure timely patching and address Windows security vulnerabilities.
Create and maintain system documentation and support protocols.
Conduct quality assurance testing for application reliability.
Build and manage vendor and consultant relationships.
Contribute to technology evaluations and recommendations.
Lead small to mid-sized projects independently.
Support training material development for Firm applications.
Perform other duties as assigned.
Core Competencies:
Collaboration: Builds strong partnerships across teams.
Trustworthiness: Demonstrates integrity and authenticity.
Customer Focus: Delivers user-centric solutions.
Results-Driven: Achieves goals under pressure.
Adaptability: Adjusts to changing demands with ease.
Resourcefulness: Uses tools and time efficiently.
Initiative: Tackles challenges with energy and urgency.
Tech-Savvy: Embraces digital innovation.
Required Skills & Experience:
Strong knowledge of:
Microsoft 365 (Office 365, SharePoint Online, Exchange Online, Dynamics, Power Automate)
Azure and Entra ID
Windows 11 and Windows Server OS
PowerShell scripting
Cloud collaboration tools (e.g., OneDrive, Box)
Remote desktop technologies (AVD, Citrix, RDP, BeyondTrust)
Application deployment tools (Intune, Endpoint Manager, MSI packaging)
Metadata management software
Tools Used:
Microsoft 365 Suite
Windows 11 & Server OS
Azure & Entra ID
Data ETL tools
Qualifications:
High school diploma or GED
3-6 years of technical experience in large environments (300+ users)
Project management experience with small to mid-sized initiatives
Strong organizational and communication skills
Ability to prioritize tasks and meet deadlines
Professional demeanor with internal and external stakeholders
Quick learner with a passion for technology
Willingness to travel (up to 10%) and work flexible hours as needed
All qualified applicants will receive consideration for employment without regard to race, color, national origin, age, ancestry, religion, sex, sexual orientation, gender identity, gender expression, marital status, disability, medical condition, genetic information, pregnancy, or military or veteran status. We consider all qualified applicants, including those with criminal histories, in a manner consistent with state and local laws, including the California Fair Chance Act, City of Los Angeles' Fair Chance Initiative for Hiring Ordinance, and Los Angeles County Fair Chance Ordinance. For unincorporated Los Angeles county, to the extent our customers require a background check for certain positions, the Company faces a significant risk to its business operations and business reputation unless a review of criminal history is conducted for those specific job positions.