Post job

Information security analyst jobs in Loma Linda, CA - 97 jobs

All
Information Security Analyst
Information Technology Analyst
Senior Information Security Analyst
Senior Security Engineer
Senior Security Analyst
Security System Engineer
Securities Analyst
Security Engineer
Information Systems Security Officer
Senior Information Security Engineer
Information Security Officer
  • Lead AI Security Engineer

    Capital Group 4.4company rating

    Information security analyst job in Irvine, CA

    "I can be myself at work." You are more than a job title. We want you to feel comfortable doing great work and bringing your best, authentic self to everything you do. We value your talents, traditions, and uniqueness-and we're committed to fostering a strong sense of belonging in a respectful workplace. We intentionally seek diverse perspectives, experiences, and backgrounds, investing in a culture designed to celebrate differences. We believe that belonging leads to better outcomes and a stronger community of associates united by our mission. At Capital, we live our core values every day: Integrity, Client Focus, Diverse Perspectives, Long-Term Thinking, and Community. "I can influence my income." You want to feel recognized at work. Your performance will be reviewed annually, and your compensation will be designed to motivate and reward the value that you provide. You'll receive a competitive salary, bonuses and benefits. Your company-funded retirement contribution will factor in salary and variable pay, including bonuses. "I can lead a full life." You bring unique goals and interests to your job and your life. Whether you're raising a family, you're passionate about where you volunteer, or you want to explore different career paths, we'll give you the resources that can set you up for success. Enjoy generous time-away and health benefits from day one, with the opportunity for flexible work options Receive 2-for-1 matching gifts for your charitable contributions and the opportunity to secure annual grants for the organizations you love Access on-demand professional development resources that allow you to hone existing skills and learn new ones "I can succeed as a Lead AI Security Engineer at Capital Group" As aLeadAISecurity Engineer, you willbe responsible forsecuring Capital Group's enterprise AI Platforms.You willhelp enable Capital Group's AIstrategy bybuilding and/orprocuringsolutions toprotecta diverse set of enterprise AI platforms being built and deployed at Capital Group.You'llcollaborate with platformengineering, security engineering, and risk teams toensure their solutions support scalable, secureadoption of AI. Additionally,you'llbe expected toprovidementoring,advising diverse teams across the organization, andpromoting AI Securityprinciples across Capital Group. AISecurityProcurementManagements:You willprocureand/or build technical solutionsto reducethe riskof misconfiguration, exploitation, andother security issues formultipleenterprise AI platforms. Embedding Security in the AIPlatform Ecosystem:Working closely withplatform teams tointegrate securityintoeverycomponentof the AI Platform. Implementing Security Controls & "Guardrails" for GenAI:Designing, deploying, andoperatingtechnical controls to prevent misuse of AI systems.Guardrails designincludescontent filtering systems, usage policies, and safety checks that mitigate issues like prompt injection attacks, unauthorized data extraction, model bias or hallucinations, and other misuse of generative AIplatforms. AI Runtime Security:Engineer continually tests and updatestothe guardrails, replacing weaker controls with more robust solutions as threats evolve. AI Governance:You will work cross functionally with architecture and platform teams tomonitoralignment of solutions to AI Governance processes Contribute to Standards and Policies:You will providethought leadership for Information Security policies and standards for AIin collaboration with technology risk AI/Agent SME:Youwill provide AI/Agent subject matterexpertisefor AI Incidentsand Security Reviews, and helpdevelop incident response playbooks for AI-related security incidents "I am the person Capital Group is looking for." You have 8+yearsof experience in information security, application security, platform security, or penetration testing,DevSecOps, networksecurityand other security disciplines. You have experience securing AI platforms, whetherinternal AIplatforms or offerings such as CoPilot Studio, Amazon Bedrock, and/or Azure AI Gateway Proficient in Programming & ML Tool.Strong Python skillsrequired, with experience in AI/ML frameworks.Abilityto review and write ML code to implement security measures (e.g., model validation, adversarial testing) isdesired. You have5+ years of relevant professional experience ordemonstrated anequivalent level ofexpertisein security engineering, such as cloud, API, or platform security. You have3+ years of experience embedded identity, network, and encryption controls into enterprise platforms Youcaneffectively partner and collaborate with stakeholder teams. You have effective communication skills andthe abilityto outline security riskstoleadership. You are familiar with cloud and API security vendors and managed services providers. Preferred Qualifications: You have knowledge and experience with technologies including Kubernetes, Containers, CI/CD, and Cloud Service Providers You are familiar withfunctionand purpose of key AI platform components such as AI gateways (Kong, Databricks Mosaic AI Gateway, custom API orchestration), Model Orchestration (ExamplesLangChain,LlamaIndex, etc.) You are familiar with key AI regulatory frameworks such as NIST AI RMF, MITRE ATLAS, GDPR, EU AI Act,etc You have information Security certifications (CISSP, SANS GIAC, CISA, etc.) "I can apply in less than 4 minutes." You've reviewed this job posting and you're ready to start the candidate journey with us. Apply now to move to the next step in our recruiting process. If this role isn't what you're looking for, check out our other opportunities and join our talent community. "I can learn more about Capital Group." At Capital Group, the success of the people who invest with us depends on the people in whom we invest. That's why we offer a culture, compensation and opportunities that empower our associates to build successful and prosperous careers. Through nine decades, our goal has been to improve people's lives through successful investing. We know that our history is a testament to the strength of the people we hire. More than 9,000 associates in 30+ offices around the world help our clients and each other grow and thrive every day. Find us on LinkedIn, Instagram, YouTube and Glassdoor. Southern California Base Salary Range: $179,273-$286,837San Antonio Base Salary Range: $147,378-$235,805New York Base Salary Range: $190,040-$304,064 In addition to a highly competitive base salary, per plan guidelines, restrictions and vesting requirements, you also will be eligible for an individual annual performance bonus, plus Capital's annual profitability bonus plus a retirement plan where Capital contributes 15% of your eligible earnings. You can learn more about our compensation and benefits here . * Temporary positions in the United States are excluded from the above mentioned compensation and benefit plans. We are an equal opportunity employer, which means we comply with all federal, state and local laws that prohibit discrimination when making all decisions about employment. As equal opportunity employers, our policies prohibit unlawful discrimination on the basis of race, religion, color, national origin, ancestry, sex (including gender and gender identity), pregnancy, childbirth and related medical conditions, age, physical or mental disability, medical condition, genetic information, marital status, sexual orientation, citizenship status, AIDS/HIV status, political activities or affiliations, military or veteran status, status as a victim of domestic violence, assault or stalking or any other characteristic protected by federal, state or local law.
    $190k-304.1k yearly 5d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Information Security Analyst

    Cathay Bank-Headquarters 4.4company rating

    Information security analyst job in Rancho Cucamonga, CA

    People Drive Our Success Are you enthusiastic, highly motivated, and have a strong work ethic? If yes, come join our team! At Cathay Bank - we strive to provide a caring culture that supports your aspirations and success. We believe people are our most valuable asset and we proudly foster growth and development empowering you to achieve your professional goals. We have thrived for 60 years and persevered through many economic cycles due to our team members' drive and optimism. Together we can make a difference in the financial future of our communities. Apply today! What our team members are saying: Video Clip 1 Video Clip 2 Video Clip 3 Learn more about us at cathaybank.com GENERAL SUMMARY This position is responsible for ensuring that the Bank's Security operations and preventive controls are managed and maintained in accordance with established Information Security policies, standards and procedures, published regulations and industry best practices. Primarily responsible for the constant review of vendor security controls in comparison with policies and industry frameworks, risk assessments, determination of control gaps and their remediation. ESSENTIAL FUNCTIONS Performs vendor security risk assessments to determine inherent risk on proposed projects and assesses vendor security controls to determine residual risk. Evaluates the potential exposure to application security risks and threats based on industry security frameworks and recommends appropriate mitigation. Assesses security practices including Information Security governance, Identity and access control, Incident monitoring and response, Vulnerability assessment and Penetration tests, Network Security and Endpoint Security, among others. Acts as liaison with Third Party Risk Management, Information Technology and business department Relationship Managers related to vendor risk assessments. Reports information security risks and follows-up remediations. Remediates audit and regulatory findings and recommendations related to Information Security and Vendor Risk Management. QUALIFICATIONS Education: College degree in Information Technology or Information Security or equivalent; Security+, SSCP, CISSP, CISM or similar information security certifications preferred. Experience: Minimum two years of experience in Information Security Risk, Information Security Operations or Security Auditing. Proven experience on third-party risk management and vendor security assessments. Working knowledge of security practices such as Endpoint Security, Network Security, Security Operations and Security Governance required. Experience working with Vendor Risk Management (VRM) applications preferred. Skills/Ability: Proven ability to initiate and manage projects. Excellent communication and problem-solving skills. Strong inter-personal communication and collaboration skills. Self-starter, highly motivated, and able to work with general supervision. OTHER DETAILS $28.84 - $33.65 / hour Pay determined based on job-related knowledge, skills, experience, and location. This position may be eligible for a discretionary bonus. Cathay Bank offers its full-time employees a competitive benefits package which is a significant part of their total compensation. It is our goal to provide employees with a comprehensive benefits package to fit their needs which includes, coverage for medical insurance, dental insurance, vision insurance, life insurance, long-term disability insurance, and flexible spending accounts (FSAs), health saving account (HSA) with company contributions, voluntary coverages, and 401(k). Cathay Bank may collect personal information from potential job candidates and applicants. For more information on how we handle personal information and your applicable rights, please review our Privacy Policy. Cathay Bank is an Equal Opportunity and Affirmative Action Employer. We welcome applications for employment from all qualified candidates, regardless of race, color, ethnicity, ancestry, citizenship, gender, national origin, religion, age, sex (including pregnancy and related medical conditions, childbirth and breastfeeding), reproductive health decision-making, sexual orientation, gender identity and expression, genetic information or characteristics, disability or medical condition, military status or status as a protected veteran, or any other status protected by applicable law. Click here to view the "Know Your Rights: Workplace Discrimination is Illegal" Poster: Poster- English Poster- Spanish Poster- Chinese Traditional Poster- Chinese Simplified Cathay Bank endeavors to make **************************** to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact, Mickey Hsu, FVP, Employee Relations Manager, at or . This contact information is for accommodation requests only and cannot be used to inquire about the status of applications.
    $28.8-33.7 hourly 5d ago
  • Sr. Information Security Engineer

    Alignment Healthcare 4.7company rating

    Information security analyst job in Orange, CA

    Sr. Information Security Engineer External Description: Alignment Healthcare is a data and technology driven healthcare company focused on partnering with health systems, health plans and provider groups to provide care delivery that is preventative, convenient, coordinated, and that results in improved clinical outcomes for seniors. We are experiencing rapid growth (backed by top private equity firms), and our team is looking for the best and brightest individuals. We love our customers and understanding them better makes it possible to provide the best clinical outcomes and care experience. Are you an Information Security Engineer with experience in automation, cloud technologies, and endpoint security? Would you like to work in an environment where your skills can be utilized effectively, and you have opportunities to make significant impact? If you are passionate about security and can reduce risk in practical ways that scale, we want to hear from you! Major Responsibilities Contributes to the daily operational aspects of the Information Security Team, primarily from a technical implementation perspective. Assists with break/fix of tools and automation that are owned by the Information Security Team. Works with internal and external customers on a variety of issues, from a simple security review of a mundane and routine ask, to a complex deep dive into a new feature implementation in O365, Azure, or AWS. Balances operational work (approximately 70% of the day) to help meet team SLAs, and project work (approximately 30% of the day) to meet assigned team deliverables. Contributes to the design, implementation, and documentation of new security tools. Collaborates with other internal information technology teams (networking, cloud, traditional architecture, developers, and data scientists) to support internal and external systems. Utilizes scripting and DevOps to provide automation and orchestration between: information security tools, such as the SIEM (Logstash, FortiSIEM, IBM QRadar, etc.); endpoint protection (Symantec, McAfee, Cylance, CrowdStrike Falcon, etc.); vulnerability scanners (Rapid7, Nessus, etc.); patch management (SCCM, Altiris, PDQ, etc.); other applications; OS' (Windows, MacOS, Linux, iOS, Android); cloud platforms (AWS, Azure); and IAM platforms (Active Directory, Okta, Auth0, PingIdentity, SAML, OIDC). Clearly documents designed automation and system relationships. Contributes and participates in the Information Security Team daily stand-ups and other meetings as necessary. Participates in regular reporting, maintaining accountability and transparency within the Information Security Team. Remains current on industry trends in cyber risk with industry standards (ISO 27001/2, NIST, CIS) and regulatory requirements (HIPAA, HITECH, HITRUST, etc.) Technical knowledge of common information security tools and systems: DLP, MAM/MDM, Firewall/VPN, endpoint protection, PKI, RBAC, IAM, etc. Demonstrated practical experience with one or more programming or scripting languages. (PowerShell, Python, C#, VB, VBA, Ruby, NodeJS, SQL, etc.) We're not picky, but you must be able to deliver practical automation! Demonstrated practical experience with one or more of the major cloud providers (AWS, Azure, GCP). Excellent oral and written communication skills, and an ability to present and discuss technical information in a way that establishes rapport and trust. Detail orientated, with an ability and desire to build to 100%, but being ok with building to 90% as tasked. An ability to be productive as an individual contributor with little supervision to meet agreed upon deliverables. Preferred Prior experience in the healthcare or a related HIPAA regulated industry. A working knowledge of the NIST CSF and/or CIS Critical Security Controls (CSC). A working knowledge of Git and GitHub. Previous experience contributing to projects using agile tools (Jira, Azure DevOps, Pivotal) and processes (Scrum, Kanban). One or more cloud security certifications. Education Bachelor's degree in Computer Science, Computer Engineering, or related technical discipline, and/or equivalent work experience. 3+ years' experience working in a technical, hands-on, information security role. One or more current security related certifications (e.g., CISSP, SANS GIAC, etc.) City: Orange State: California Location City: Orange Schedule: Full Time Location State: California Community / Marketing Title: Sr. Information Security Engineer Company Profile: Alignment Healthcare was founded with a mission to revolutionize health care with a serving heart culture. Through its unique integrated care delivery models, deep physician partnerships and use of proprietary technologies, Alignment is committed to transforming health care one person at a time. By becoming a part of the Alignment Healthcare team, you will provide members with the quality of care they truly need and deserve. We believe that great work comes from people who are inspired to be their best. We have built a team of talented and experienced people who are passionate about transforming the lives of the seniors we serve. In this fast-growing company, you will find ample room for growth and innovation alongside the Alignment community. EEO Employer Verbiage: On August 17, 2021, Alignment implemented a policy requiring all new hires to receive the COVID-19 vaccine. Proof of vaccination will be required as a condition of employment subject to applicable laws concerning exemptions/accommodations. This policy is part of Alignment's ongoing efforts to ensure the safety and well-being of our staff and community, and to support public health efforts. Alignment Healthcare, LLC is proud to practice Equal Employment Opportunity and Affirmative Action. We are looking for diversity in qualified candidates for employment: Minority/Female/Disable/Protected Veteran. If you require any reasonable accommodation under the Americans with Disabilities Act (ADA) in completing the online application, interviewing, completing any pre-employment testing or otherwise participating in the employee selection process, please contact ******************.
    $125k-156k yearly est. Easy Apply 60d+ ago
  • Information Security Analyst

    Vesync

    Information security analyst job in Tustin, CA

    Job DescriptionThe Company: VeSync is a portfolio company with brands that cover different categories of health & wellness products. We wouldn't be surprised if you have one of our Levoit air purifiers in your living room or a COSORI air fryer whipping up healthy and delicious meals for you every night. We're a young and energetic company, we've had tremendous success, and we are constantly growing our team. As we garner more industry attention - just check out our accomplishments and awards by CES Innovation, iF Design, IGA, and Red Dot - we also need driven and talented people to join our team. That brings us to you, and what you'll be joining. Our teams are smart and diligent and take ownership of their work - they're confident in their work but know how to collaborate with open ears and a spirit of learning. If you're down-to-earth, approachable, and easy to strike up a conversation with, this may be a great fit for you. Check out our brands:levoit.com \u007C cosori.com \u007C etekcity.com The Opportunity: The Information Security Analyst is responsible for supporting the organization's security posture by implementing, monitoring, and maintaining security controls across systems, networks, and cloud environments. This role works closely with senior security team members to identify risks, respond to incidents, and ensure compliance with security standards and regulatory requirements.What you will do at VeSync: Information Security Operations & Planning Support the implementation and maintenance of information security controls to protect company data and assets across on-premise and cloud environments. Assist in analyzing business processes, systems, and data flows to identify security gaps and improvement opportunities. Apply industry best practices and frameworks such as the NIST Cybersecurity Framework (CSF) to support confidentiality, integrity, and availability of information assets. Policy Support & Compliance Assist in the development, implementation, and maintenance of information security policies, standards, and procedures. Support compliance efforts with industry standards and regulations (e.g., ISO 27001, NIST, GDPR). Help track evidence and controls using compliance and GRC tools such as OneTrust, Drata, or similar platforms. Monitor regulatory and security trends and escalate relevant changes to senior team members. System, Network, and Cloud Security Monitor and help maintain security controls for systems, networks, and public cloud platforms (AWS, Azure, GCP). Assist with configuration, monitoring, and tuning of cloud security services and tools. Use security tools and dashboards (e.g., SIEM, security scorecards) to identify potential threats and vulnerabilities. Support AWS security services and baseline configurations. Security Monitoring & Incident Response Monitor security alerts and events using SIEM and security monitoring tools. Participate in incident response activities, including investigation, containment, remediation, and post-incident analysis. Assist with blue team activities, tabletop exercises, and response drills to improve readiness. Document incidents and lessons learned. Identity & Access Management Support user access reviews, permission audits, and access control processes. Assist with identity management systems to ensure appropriate authentication and authorization controls. Help identify and remediate excessive or inappropriate access. Risk Assessment & Vulnerability Management Participate in risk assessments and vulnerability identification efforts. Assist with vulnerability scanning, tracking, and remediation coordination. Support risk documentation and reporting aligned with frameworks such as NIST CSF. Help track and report basic security metrics and KPIs. Security Awareness & Documentation Support the delivery of security awareness training and phishing simulations. Assist in developing security documentation, including procedures, controls, detection rules, and response playbooks. Maintain clear and accurate security documentation for audits and operational use. What you bring to the role: Bachelor's degree in Information Security, Computer Science, or a related field (or equivalent experience). 3-6 years of experience in information security or a related IT/security role. Hands-on experience with security monitoring, incident response, vulnerability management, or risk assessment. Familiarity with cloud environments (AWS, Azure, or GCP) and basic cloud security concepts. Working knowledge of security frameworks and standards such as NIST CSF, ISO 27001, and CIS. Understanding of network security fundamentals, including firewalls, IDS/IPS, endpoint protection, and logging. Experience with SIEM or security monitoring tools such as Splunk, QRadar, Rapid7, or Wazuh. Strong analytical, troubleshooting, and communication skills. Preferred Qualifications Experience supporting compliance or audit activities. Familiarity with GRC or compliance automation tools (OneTrust, Drata, or similar). Relevant security certifications such as Security+, CEH, GSEC, or progress toward CISSP/CISM. Location: This is an on-site, office-based role in Tustin, CA. Salary: Starting at $90K Annually Perks and Benefits: 100% covered Medical/Dental/Vision insurance for employee AND spouse + dependents! 401K with 4% employer match (eligible after 90 days of employment) and immediate 100% vesting Generous PTO policy + paid holidays Life Insurance Voluntary Life Insurance Disability Insurance Critical Illness Coverage Accident Insurance Healthcare FSA Dependent Care FSA Travel Assistance Program Employee Assistance Program (EAP) Fully stocked kitchen
    $90k yearly 4d ago
  • Global Chief Information Security Officer (CISO)

    Security Director In San Diego, California

    Information security analyst job in Irvine, CA

    Allied Universal , North America's leading security and facility services company, offers rewarding careers that provide you a sense of purpose. While working in a dynamic, welcoming, and collaborative workplace, you will be part of a team that contributes to a culture that positively impacts the communities and customers we serve. Job Description Allied Universal is hiring a Global Chief Information Security Officer (CISO). The Global Chief Information Security Officer (GCISO) will lead Allied Universal's global cybersecurity strategy and operations, serving as the single accountable executive for cybersecurity across all of Allied Universal's global operations, responsible for protecting the company's people, systems, and data. Allied Universal is the 3 rd largest employer in North America and the 7th largest employer in the world, with approximately 800,000 employees in more than 100 countries and territories. This role is responsible for defining, implementing, and maintaining a comprehensive, risk-based cybersecurity program designed to protect Allied Universal's assets and technology platforms against evolving threats. The GCISO must be both a strategic leader and a hands-on practitioner capable of translating complex technical risks into business terms, fostering a culture of cybersecurity accountability throughout the organization, and directly engaging in key operational, investigative, and incident-response activities when necessary. The GCISO reports directly to the Global General Counsel to ensure independent oversight and transparency to executive leadership and the Board, with a dotted-line reporting relationship to the Chief Technology Officer for alignment with technology architecture, strategy, and operations. The GCISO directly manages Regional Cybersecurity Leaders, who implement global standards and maintain local readiness while partnering closely with Regional Chief Information Officers (CIOs) to integrate cybersecurity requirements into regional IT operations and project delivery. The GCISO will operate out of our headquarters in Irvine, CA. RESPONSIBILITIES: Strategic Leadership: Develop and execute a global, risk-based cybersecurity strategy and program aligned with Allied Universal's business objectives Establish, communicate, and oversee governance of enterprise-wide cybersecurity policies, standards, and controls that are appropriate for the company's diverse global operations Lead, mentor and manage Regional Cybersecurity Leaders to promote consistency, accountability, and operational effectiveness across all regions Define and monitor key risk indicators, cybersecurity metrics, and maturity objectives to inform executive decision-making and drive ongoing program improvement Oversee global monitoring, detection, and response capabilities that provide 24×7 visibility into potential cyber risks and support timely containment activities Identify and assess emerging threats, technologies, and vulnerabilities to support informed planning and risk mitigation efforts Provide recommendations regarding cybersecurity investments and resource allocation, helping prioritize efforts based on risk, business impact, and value Collaboration and Stakeholder Engagement: Foster a culture of cybersecurity awareness, ownership, and accountability across all functions and geographies Coordinate, develop, and implement programs designed to train Allied Universal's workforce regarding the company's cybersecurity requirements, including applicable cybersecurity laws and requirements and responding to evolving cybersecurity threats Risk Management: Evaluate emerging threats and vulnerabilities, driving continuous improvement of the company's cybersecurity posture as appropriate Direct recurring global cybersecurity risk assessments; oversee associated cybersecurity risk management activities, including maintenance of a risk register, remediation tracking, and risk decisions Oversee periodic internal and external cybersecurity audits to verify adherence to policies, standards and regulatory requirements Report promptly on cybersecurity risks to relevant Allied Universal Leadership upon identifying risks that exceed tolerance levels Compliance: Support compliance with regulatory requirements as well as any Allied Universal and customer contractual obligations for cyber security Remain current and knowledgeable regarding applicable cybersecurity laws and regulations, including laws and regulations applicable to government contractors Lead on various external cybersecurity initiatives, including compliance for protecting sensitive data such as responding to regulators and customer audits Incident Response: Direct and continuously improve the enterprise incident-response program, including playbooks, tabletop exercises, and post-incident reviews Lead cross-functional coordination with Legal, Technology, Operations, and Regional CIOs to contain and recover from major cyber incidents Oversee specialized incident-response and investigative resources for critical events Provide timely updates to the CEO, Global General Counsel, and Board on incident status, impact, and remediation progress Assessments and Audits: Review and assess the effective deployment of cybersecurity technologies, tools and software by Allied Universal, third parties, and related vendors Coordinate and respond to various cybersecurity assessments, including, as required, certifications to process certain government-related data or other sensitive data Monitor and manage cybersecurity aspects of the third-party lifecycle and confirm that third parties' cybersecurity practices align with Allied Universal's cybersecurity risk tolerance Third-Party Due Diligence: Communicate/respond to requests regarding the effectiveness of Allied Universal's cybersecurity program regarding third-party diligence, selection, and monitoring (e.g., insurance, debt financing, public accounting, initial public offering, etc.) in coordination with Allied Universal Leadership, including IT, Legal and Procurement Communication and Reporting: Provide regular briefings to the CEO, Global General Counsel, and Board of Directors on cybersecurity posture, key risks, and, if applicable, major incidents. Communicate with internal and external stakeholders (including government and prime contractor customers) regarding Allied Universal's cybersecurity program Prepare and present reports on Allied Universal's cybersecurity posture to the CEO and Board of Directors, and other Allied Universal Leadership Business Continuity and Disaster Recovery: Partner with IT and Operations to ensure business-continuity and disaster-recovery programs incorporate cybersecurity risk considerations, are regularly tested, and effectively support enterprise resilience objectives QUALIFICATIONS (MUST HAVE): Bachelor's degree in computer science, Information Technology, cybersecurity, or a related field Minimum of fifteen (15) years of progressive experience in cybersecurity Minimum of seven (7) years in a senior management role in an information security function Experience in managing, responding to, and mitigating cyber incidents Experience or familiarity with government contracting and public and private company cybersecurity reporting requirements Hands-on cyber incident response coordination and oversight experience Expertise in risk-based frameworks (NIST CSF, ISO 27001, SOC 2, CMMC, NIST 800-171) and familiarity with applicable regulatory regimes (SEC, GDPR, state breach laws, etc.) Proven ability to engage with CEO, Board of Directors, and Executive Team on cybersecurity strategy and governance Ability to operate effectively as both strategist and practitioner, a player-coach who drives global cybersecurity direction while engaging hands-on to guide, mentor, and resolve complex technical and operational challenges Strong leadership skills as well as the ability to work and communicate (verbal, written, and interpersonal) effectively with other leadership and their teams An entrepreneurial and innovative mindset regarding cybersecurity development and operations A strong understanding of the business impact of cybersecurity policies, tools, and technologies, including leveraging existing assets and talent to efficiently manage cybersecurity spend PREFERRED QUALIFICATIONS (NICE TO HAVE): Recognized security certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), etc. COMPENSATION AND BENEFITS: Base salary range: $275,000 to $350,000 (based on skills, qualifications, and relevant experience), annual bonus, equity package Medical, dental, vision, supplemental income plan with a company match, basic life, AD&D, and disability insurance Eight paid holidays annually, five sick days, and four personal days Executive Flex Vacation Plan Closing Allied Universal is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race/ethnicity, age, color, religion, sex, sexual orientation, gender identity, national origin, genetic information, disability, protected veteran status or relationship/association with a protected veteran, or any other basis or characteristic protected by law. For more information: *********** If you have difficulty using the online system and require an alternate method to apply or require an accommodation, please contact our local Human Resources department. To find an office near you, please visit: ***********/offices. Requisition ID 2026-1510953
    $275k-350k yearly Auto-Apply 4d ago
  • Sr. Security Compliance Analyst

    TP-Link Systems 3.9company rating

    Information security analyst job in Irvine, CA

    Headquartered in the United States, TP-Link Systems Inc. is a leading global provider of networking devices and smart home products. Consistently ranked as the world's top provider of Wi-Fi devices, TP-Link is dedicated to delivering innovative solutions that improve people's lives by offering faster, more reliable connectivity. Serving customers in over 170 countries, we are committed to expanding our global footprint. At TP-Link Systems Inc., we believe that technology has the power to transform the world for the better. Our mission is to design reliable, high-performance products that connect users worldwide to the limitless possibilities of technology. We are driven by our core values of professionalism, innovation, excellence, and simplicity. Our goal is to help clients achieve outstanding global performance and to provide consumers with a seamless, effortless technology experience. TP-Link Systems Inc. is seeking a skilled and proactive Sr. Security Compliance Analyst who will be responsible for developing and overseeing TP-Link's enterprise security governance framework, ensuring compliance with regulatory requirements, industry standards, and internal policies. This individual will collaborate with cross-functional teams to embed security into business operations, manage risk, and enhance security resilience across TP-Link's enterprise ecosystem. Key Responsibilities: Security Governance & Policy Development Develop, implement, and maintain security policies, standards, and guidelines aligned with industry best practices (e.g., NIST, ISO 27001, CIS). Establish and lead a security governance framework to ensure consistent application of security controls across the enterprise. Risk Management & Compliance Identify, assess, and mitigate security risks across TP-Link's global operations. Ensure compliance with regulatory requirements such as GDPR, CCPA, NIST CSF, and other applicable cybersecurity frameworks. Oversee security audits, risk assessments, and third-party security evaluations. Partner with legal, IT, and business leaders to address security compliance gaps. Third-Party & Supply Chain Security Develop and enforce security requirements for vendors, suppliers, and third-party partners. Conduct security assessments of supply chain partners to identify and mitigate potential risks. Security Awareness & Training Develop and lead security awareness programs to educate employees on cybersecurity risks and best practices. Foster a security-first culture across all levels of the organization. Provide guidance and training on security governance processes for internal stakeholders. Incident Response & Continuous Improvement Support security incident response efforts by ensuring governance processes facilitate rapid detection and response. Lead post-incident analysis to refine security policies and controls. Monitor emerging threats, regulatory changes, and industry trends to evolve TP-Link's security governance strategies. Requirements Qualifications Education: Bachelor's degree in Computer Science, Cybersecurity, Information Security, or a related field. Experience: 5+ years of experience in security governance, risk management, or compliance in a global technology or networking company. Proven track record in developing and implementing security governance frameworks for enterprise security. Experience managing compliance with industry standards and regulations (ISO 27001, NIST CSF, SOC 2, GDPR, CCPA, etc.). Hands-on experience with supply chain security, third-party risk management, and vendor security assessments. Skills: Deep understanding of security frameworks (ISO 27001, NIST, CIS, SOC 2) and regulatory requirements. Strong expertise in risk management methodologies, security policy development, and compliance auditing. Proficient in conducting security assessments, third-party risk evaluations, and internal security reviews. Ability to communicate complex security concepts to business and technical stakeholders effectively. Strong leadership skills with experience in cross-functional collaboration and executive reporting. Benefits Salary range: $100,000-$150,000 Free snacks and drinks, and provided lunch on Fridays Fully paid medical, dental, and vision insurance (partial coverage for dependents) Contributions to 401k funds Bi-annual reviews, and annual pay increases Health and wellness benefits, including free gym membership Quarterly team-building events At TP-Link Systems Inc., we are continually searching for ambitious individuals who are passionate about their work. We believe that diversity fuels innovation, collaboration, and drives our entrepreneurial spirit. As a global company, we highly value diverse perspectives and are committed to cultivating an environment where all voices are heard, respected, and valued. We are dedicated to providing equal employment opportunities to all employees and applicants, and we prohibit discrimination and harassment of any kind based on race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Beyond compliance, we strive to create a supportive and growth-oriented workplace for everyone. If you share our passion and connection to this mission, we welcome you to apply and join us in building a vibrant and inclusive team at TP-Link Systems Inc. Please, no third-party agency inquiries, and we are unable to offer visa sponsorships at this time.
    $100k-150k yearly Auto-Apply 60d+ ago
  • Sr. Information Security GRC Analyst

    Loan Depot 4.7company rating

    Information security analyst job in Irvine, CA

    Responsible for driving the development, implementation, communication, and maintenance of loan Depot's technology policies, standards and procedures that are aligned to industry standards and regulatory requirements. Ensures that loan Depot technology processes adheres to regulatory requirements, manages risks effectively, and establishes strong governance practices. Develops and implements controls, monitors compliance, and supports risk management activities. Responsibilities: * Leads the development and implementation of comprehensive cybersecurity and IT policies, standards, and guidelines. * Continuously evaluates and updates cybersecurity and IT policies to ensure they remain current and effective. * Ensures policies comply with relevant laws, regulations, and industry standards (e.g., NIST, FFIEC, GLBA, NYDFS, SOX and PCI-DSS). * Collaborates with teams, working closely with IT, legal, compliance, and other departments, to gain a deep understanding of business needs to ensure cybersecurity policies align with business objectives. * Transforms complex information and documentation into simple concepts that are easy to understand by the end-users. * Offers specialized expertise and consultation to cross-functional teams to perform framework-oriented risk assessments, identify deficiencies, generate reports, and recommends prioritized, actionable solutions to mitigate risks and enhance loan Depot's overall security posture. * Stays informed about the latest cybersecurity threats, trends, and best practices. Ensures accurate and up-to-date records of policy reviews, risk assessments, training activities, and incident responses. * Benchmarks the organization's policies against industry standards and best practices. * Develops and implements governance frameworks for cybersecurity policy management. * Monitors key performance indicators, conducts gap analysis, risk assessments and implements frameworks, as needed. Tests and monitors effectiveness of controls. * Establishes a feedback loop and analyzes metrics to continuously improve cybersecurity policies based on audit findings, incident reviews, and emerging threats. * Actively leads and supports on internal and external audits and assessments of cybersecurity policies and practices. Accountable for ensuring identified audit and assessment findings and actions are tracked to closure. * Maintains comprehensive documentation of all cybersecurity policies, procedures, and related activities. Communicates policy requirements and updates to all relevant stakeholders. * Identifies opportunities for innovation and improvement in cybersecurity policy and practice. Proposes suitable mitigation strategies and verifies the effectiveness of remediation plans Requirements: * Bachelor's Degree in Information Security, Computer Science, Information Technology, or a related field preferred. * Minimum of six (6) + years' experience working in Cybersecurity GRC, policy development, risk management, or a similar field. * Experience with GRC tools (e.g., Archer, ServiceNow, OneTrust). * Proficiency in using data analysis and reporting tools (e.g., Excel, Power BI). * Relevant certifications such as CISM and/or CISA are highly desirable. Why work for #teamloan Depot: * Competitive compensation package based on experience, skillset and overall fit for #TeamloanDepot. * Inclusive, diverse, and collaborative culture where people from all backgrounds can thrive * Work with other passionate, purposeful, and customer-centric people * Extensive internal growth and professional development opportunities including tuition reimbursement * Comprehensive benefits package including Medical/Dental/Vision * Wellness program to support both mental and physical health * Generous paid time off for both exempt and non-exempt positions About loan Depot: loan Depot (NYSE: LDI) is a digital commerce company committed to serving its customers throughout the home ownership journey. Since its launch in 2010, loan Depot has revolutionized the mortgage industry with a digital-first approach that makes it easier, faster, and less stressful to purchase or refinance a home. Today, as the nation's second largest non-bank retail mortgage lender, loan Depot enables customers to achieve the American dream of homeownership through a broad suite of lending and real estate services that simplify one of life's most complex transactions. With headquarters in Southern California and offices nationwide, loan Depot is committed to serving the communities in which its team lives and works through a variety of local, regional, and national philanthropic efforts. Base pay is one part of our total compensation package and is determined within a range. This provides the opportunity to progress as you grow and develop within a role. The base pay for this role is between $99,000 and $136,500. Your base pay will depend on multiple individualized factors, including your job-related knowledge/skills, qualifications, experience, and market location. We are an equal opportunity employer and value diversity in our company. We do not discriminate based on race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
    $99k-136.5k yearly Auto-Apply 11d ago
  • Senior Security Engineer

    Goodleap 4.6company rating

    Information security analyst job in Irvine, CA

    About GoodLeap:GoodLeap is a technology company delivering best-in-class financing and software products for sustainable solutions, from solar panels and batteries to energy-efficient HVAC, heat pumps, roofing, windows, and more. Over 1 million homeowners have benefited from our simple, fast, and frictionless technology that makes the adoption of these products more affordable, accessible, and easier to understand. Thousands of professionals deploying home efficiency and solar solutions rely on GoodLeap's proprietary, AI-powered applications and developer tools to drive more transparent customer communication, deeper business intelligence, and streamlined payment and operations. Our platform has led to more than $30 billion in financing for sustainable solutions since 2018. GoodLeap is also proud to support our award-winning nonprofit, GivePower, which is building and deploying life-saving water and clean electricity systems, changing the lives of more than 1.6 million people across Africa, Asia, and South America. Position Summary The GoodLeap security team is responsible for both business enablement and safeguarding the organization's information assets; it is involved in virtually all aspects of the business, from product safety and resilience, to building security paved roads, customer, partner, and regulatory trust, managing technology governance and compliance, and ensuring the privacy, and safety of GoodLeap's customers, partners, and employees information. The senior security engineer role provides a unique opportunity to shape the security and resilience of GoodLeap corporate systems, services, and operational processes. In this role, you will work closely with product, engineering, IT, and business teams within GoodLeap, acting as the key individual with both the authority and responsibility to ensure the safety and resilience of enterprise systems, products, and services. Your oversight will encompass: - Enterprise systems:Identifying potential misuse and abuse cases, proposing solutions to address these scenarios, and identifying product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. - Build-time controls: Managing applications/products security controls and activities during development. - Runtime controls: Overseeing security measures at runtime, from prevention to detection and response. Additionally, you will be involved with aspects of internally built products and represent all areas of security, spanning governance, risk, and compliance (GRC) to security monitoring, for a number of departments/teams. You will also have the authority and ability to involve other security team members as needed. While you will take on multiple responsibilities-from advisor to builder and beyond-your primary focus will be designing and building security patterns and practices for services and processes, and fostering strong relationships with product, business, and engineering. Essential Job Duties & Responsibilities Lead, participate in, and contribute to partnerships between security, IT, General & Administrative teams, engineering, product, and operations teams to build, orchestrate, and automate security controls and services in GoodLeap enterprise systems, products, services, and operational processes. Identify potential misuse and abuse cases in enterprise systems, propose solutions to address these scenarios, and identify product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. Support or develop components of the security analytics platform. Contribute to investigations, threat hunting, and incident response activities in a supporting role. Collaborate with the monitoring and response team to create playbooks for specific incident response scenarios related to the products and services you oversee. These investigations, incidents, and playbooks may address security, fraud, privacy, resilience, and related concerns. Support the security operations team with the vulnerability management lifecycle for products and services under your purview. Ensure technical alignment for the products and services you oversee with team initiatives, including GRC, security operations, and monitoring and response activities. Required Skills, Knowledge & Abilities Strong communicator with the ability to lead technical architecture discussions, drive technical decisions, and effectively communicate with non-technical audiences. Expertise in agile product lifecycles. Ideally, you have experience in a product manager or engineering manager role and understand how SaaS products (B2B, B2B2C, and B2C) are built, including roadmap planning and feature and defect prioritization. Experience with threat modeling methodologies, with the ability to create efficient and scalable approaches to conducting such assessments. Familiarity with AWS services, including KMS, SST, Container Registry, ELBs, Lambda, API Gateway, CloudTrail, and IAM (knowledge of GCP and/or Azure is a plus). Proven ability to establish credibility and build trust with business, engineers, and operational staff; confident yet humble. Hands-on experience with managing security for core enterprise systems, e.g., ERP, HCM, Salesforce, etc. Strong understanding of both human and non-human identity management and common enterprise and consumer authentication standards and use cases. Practical experience with CI/CD pipelines and DevOps tools, including Infrastructure-as-Code (IaC) tools like Terraform, Pulumi, or CDK; GitHub and GitHub Actions; artifact management; and secrets management tools like Doppler and HashiCorp Vault. Passionate about learning new technologies. While you're not expected to know everything, you should demonstrate a willingness and ability to learn as needed. Prior experience interfacing and supporting with G&A teams, internal product teams, and other cross-functional areas. Proficiency in writing automation scripts in multiple languages, with prior experience automating security processes in cloud or SaaS environments. Experience engaging with vendors in design partnerships. Experience overseeing vulnerability and threat management at the platform and application levels. Familiarity with penetration testing and red team exercises, including manual verification, exploitation, and lateral movement. Ability to balance a high-level view of security strategy with attention to detail, ensuring thorough and effective execution. In addition to the above salary, this role may be eligible for a bonus. Additional Information Regarding Job Duties and s: Job duties include additional responsibilities as assigned by one's supervisor or other managers related to the position/department. This job description is meant to describe the general nature and level of work being performed; it is not intended to be construed as an exhaustive list of all responsibilities, duties and other skills required for the position. The Company reserves the right at any time with or without notice to alter or change job responsibilities, reassign or transfer job position or assign additional job responsibilities, subject to applicable law. The Company shall provide reasonable accommodations of known disabilities to enable a qualified applicant or employee to apply for employment, perform the essential functions of the job, or enjoy the benefits and privileges of employment as required by the law. If you are an extraordinary professional who thrives in a collaborative work culture and values a rewarding career, then we want to work with you! Apply today! We are committed to protecting your privacy. To learn more about how we collect, use, and safeguard your personal information during the application process, please review our Employment Privacy Policy and Recruiting Policy on AI. We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $114k-145k yearly est. 5d ago
  • IT Security Analyst II

    Monster 4.7company rating

    Information security analyst job in Corona, CA

    Energy: Forget about blending in. That's not our style. We're the risk-takers, the trailblazers, the game-changers. We're not perfect, and we don't pretend to be. We're raw, unfiltered, and a bit unconventional. But our drive is unrivaled, just like our athletes. The power is in your hands to define what success looks like and where you want to take your career. It's not just about what we do, but about who we become along the way. We are much more than a brand here. We are a way of life, a mindset. Join us. A day in the life: Rev up your career as an IT Security Analyst II at Monster Energy, where you'll be on the frontlines of cyber defense! Your mission? Identify, track, and analyze cyber threats with the precision of a racing champion. Harness your technical and analytical skills to decode threat tactics, techniques, and procedures (TTPs), assessing impacts like a pro and effectively communicating your findings to management and stakeholders. Master the MITRE ATT&CK framework and stay ahead of the curve, adapting to the ever-evolving cyber landscape. Keep a keen eye on security tools like MS Defender, Red Canary, and BlueVoyant, tackling tickets, and neutralizing any threats that dare to challenge MEC. Get ready to protect and serve with Monster Energy's unstoppable spirit! The impact you'll make: Threat Identification and Tracking potential threats such as malware or hacking attempts Vulnerability Response Management using ServiceNow, MS Defender, Tenable.io Participate in MDR/EDR actionable events and fine tuning alerts from 3rd party monitoring such as Red Canary and Blue Voyant Work with the team and with 3rd parties to update and maintain rules associated with securing endpoints and identities Ensure up-to-date documentation surrounding cyber security awareness, training, security events, incidents and all reported issues Who you are: Key Competencies: Oral and written communication skills Learning skills Customer service orientated Problem analysis Problem-solving Adaptability Planning and organizing Attention to detail Ability to multi-task and work in a fast paced environment Preferred Requirements: Bachelor's Degree in IT Cyber Security or related field Experience with MS Windows 11, MS Office suite to include Word, Excel, and Powerpoint Minimum 1 year of experience in MS Office Suite Between 3-5 years of experience in Industry standards such as NIST Monster Energy provides a competitive total compensation. This position has an estimated annual salary of $78,750 - $105,000. The actual pay may vary depending on your skills, qualifications, experience, and work location.
    $78.8k-105k yearly 60d+ ago
  • Systems Security Engineer II - P2 (Onsite-Fullerton, CA)

    RTX

    Information security analyst job in Fullerton, CA

    Country: United States of America Onsite U.S. Citizen, U.S. Person, or Immigration Status Requirements: Active and transferable U.S. government issued security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance Security Clearance: Secret - Current At Raytheon, the foundation of everything we do is rooted in our values and a higher calling - to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today's mission and stay ahead of tomorrow's threat. Our team solves tough, meaningful problems that create a safer, more secure world. Raytheon is seeking a well-qualified Systems Security Engineer II (P2) to join our Systems Security Engineering (SSE) team in developing solutions to protect the Warfighter's technology advantage. Systems Security Engineering creates holistic security solutions leveraging Cyber Security, Software Assurance and Supply Chain Risk Management to support Program Protection Implementation on embedded weapons systems. Join our highly visible team and perform technically challenging assignments, which will directly contribute to protecting our nation and our Warfighters. This is an onsite position at Raytheon in Fullerton, CA. What You Will Do Lead the patch team, ensuring on-time delivery of patches to our customer Perform analysis on cybersecurity collected data and test results Validate secure configuration of routers, switches, firewalls, servers, operating systems, applications, and other assets, using DoD approved scanning and assessment tools such as Nessus, STIG, Evaluate STIG, and/or RADIX Create and maintain Linux Bash and Python scripts Create patch artifacts such as patch media and information assurance posture reports Qualifications You Must Have Typically requires a Bachelor's Degree in Science, Technology, Engineering or Mathematics (STEM) and 2 years of prior relevant experience Active and transferable U.S. government issued DoD Secret security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance Experience in System Security Engineering, computer technology reverse engineering, cybersecurity or embedded security Qualifications We Prefer Experience with scrum planning and scrum tools such as Jira Experience in the SSE implementation throughout the entire life cycle Experience contributing to a team environment for the purpose of developing creative solutions to technical problems Cyber Certifications in accordance with DoDD 8570/DoDD 8140 such as CISSP, GSLC, CEH Experience supporting the development of Risk Management Framework (RMF) documents and controls validation testing for Authority to Operate (ATO) accreditations Candidate must exhibit an exceptional degree of ingenuity, creativity and resourcefulness Excellent communication, technical writing, oral presentation and interpersonal skills What We Offer Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Trust, Respect, Accountability, Collaboration, and Innovation Relocation Eligible - Relocation assistance is available As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote. The salary range for this role is 72,000 USD - 144,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window. RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act. Privacy Policy and Terms: Click on this link to read the Policy and Terms
    $96k-139k yearly est. Auto-Apply 3d ago
  • Systems Security Engineer II - P2 (Onsite-Fullerton, CA)

    RTX Corporation

    Information security analyst job in Fullerton, CA

    **Country:** United States of America ** Onsite **U.S. Citizen, U.S. Person, or Immigration Status Requirements:** Active and transferable U.S. government issued security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance **Security Clearance:** Secret - Current At Raytheon, the foundation of everything we do is rooted in our values and a higher calling - to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today's mission and stay ahead of tomorrow's threat. Our team solves tough, meaningful problems that create a safer, more secure world. Raytheon is seeking a well-qualified **Systems Security Engineer II (P2)** to join our Systems Security Engineering (SSE) team in developing solutions to protect the Warfighter's technology advantage. Systems Security Engineering creates holistic security solutions leveraging Cyber Security, Software Assurance and Supply Chain Risk Management to support Program Protection Implementation on embedded weapons systems. Join our highly visible team and perform technically challenging assignments, which will directly contribute to protecting our nation and our Warfighters. This is an onsite position at Raytheon in Fullerton, CA. **What You Will Do** + Lead the patch team, ensuring on-time delivery of patches to our customer + Perform analysis on cybersecurity collected data and test results + Validate secure configuration of routers, switches, firewalls, servers, operating systems, applications, and other assets, using DoD approved scanning and assessment tools such as Nessus, STIG, Evaluate STIG, and/or RADIX + Create and maintain Linux Bash and Python scripts + Create patch artifacts such as patch media and information assurance posture reports **Qualifications You Must Have** + Typically requires a Bachelor's Degree in Science, Technology, Engineering or Mathematics (STEM) and 2 years of prior relevant experience + Active and transferable U.S. government issued DoD Secret security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance + Experience in System Security Engineering, computer technology reverse engineering, cybersecurity or embedded security **Qualifications We Prefer** + Experience with scrum planning and scrum tools such as Jira + Experience in the SSE implementation throughout the entire life cycle + Experience contributing to a team environment for the purpose of developing creative solutions to technical problems + Cyber Certifications in accordance with DoDD 8570/DoDD 8140 such as CISSP, GSLC, CEH + Experience supporting the development of Risk Management Framework (RMF) documents and controls validation testing for Authority to Operate (ATO) accreditations + Candidate must exhibit an exceptional degree of ingenuity, creativity and resourcefulness + Excellent communication, technical writing, oral presentation and interpersonal skills **What We Offer** + Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Trust, Respect, Accountability, Collaboration, and Innovation + Relocation Eligible - Relocation assistance is available **_As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote._** The salary range for this role is 72,000 USD - 144,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills. Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement. Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance. This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply. RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window. _RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act._ **Privacy Policy and Terms:** Click on this link (******************************************************** to read the Policy and Terms Raytheon Technologies is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class.
    $96k-139k yearly est. 60d+ ago
  • Information Systems Security Officer

    CSA Global 4.3company rating

    Information security analyst job in Westminster, CA

    Full-time Description For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools, and proven processes to advance federal missions. Client Solution Architects (CSA) is currently seeking an Information Systems Security Officer to support a program at Grafenwoehr, Germany. Works with System Administrators (SA), Command Information System Security Manager (ISSM), other Information System Security Officers (ISSOs), multiple Branch Heads, multiple Program Managers (PMs) and a project strategist in support of the completion of a mixture of Certification and Accreditation (C&A) boundaries consolidated into overarching master boundaries in support of information assurance policy and regulations. In addition to C&A package development, the individual will be responsible for the day-to-day operations as an ISSO. How Role will make an impact: Develop and maintain an organizational or system-level cybersecurity program that includes cybersecurity architecture, requirements, objectives and policies, cybersecurity personnel, and cybersecurity processes and procedures. Provide support to the System Owner and the ISSM for maintaining the appropriate operational IA posture for a system, program, or enclave. Provide support to the customer on all matters involving the security of their information systems. Assist with the management of all security aspects of the information system and as assigned performs day-to-day security operations of the system. Assist in the development of the system security policy and ensures compliance with that policy on a routine basis. Prepare, validate, and maintain security documentation including, but not limited to: system security plan (SSP), risk assessment (RA), contingency plan (CP), privacy impact assessment (PIA), eAuthentication assessment, FIPS categorization. Provide configuration management for security-relevant information system software, hardware, and firmware, controlling changes to the system and assessing the security impact of those changes. Identify and mitigate security business and system risks. Identify and manage POA&Ms through remediation as well as develop corrective action plans for each POA&M. Maintain a repository for all organizational or system-level cybersecurity-related documentation such as RMF processes within eMASS or other automated process. Maintain Defense Information Technology Portfolio Registry (DITPR) for client systems and software. Ensure implementation of Information System (IS) security measures and procedures, including reporting incidents to the Command Information System Security Manger (ISSM) and appropriate reporting chains as well as coordinating system-level responses to unauthorized disclosures in accordance with DoDM 5200.01 Vol 3 for classified information or DoDM 5200.01 Vol 4 for CUI, respectively. Implement and enforce all DoD IS and Platform Information Technology (PIT) system cybersecurity policies and procedures, as defined by cybersecurity-related documentation. Ensure that all users have the requisite security clearances and access authorization, and are aware of their cybersecurity responsibilities for DoD IS and PIT systems under their purview before being granted access to those systems. In coordination with the ISSM, initiate protective or corrective measures when a cybersecurity incident or vulnerability is discovered. Establish a process for authorized users to report all cybersecurity-related events and potential threats and vulnerabilities to the ISSO. Ensure that all DoD IS cybersecurity-related documentation is current and accessible to properly authorized individuals. Ensures proper Configuration Management procedures are followed. Prior to implementation and contingent upon necessary approval with the ISSM. Initiates requests for temporary and permanent exception, deviations, or waivers to IA requirements such as Plan of Action and Milestones (POA&Ms). Ensures IA and IA-enabled software, hardware and firmware comply with appropriate security configuration guides. Provide status updates of assigned duties to the appropriate agency heads as defined in their respective Service Level Agreement (SLA). Respond to all applicable data calls, CTO's, FRAGO's, IAVA's ,etc within the requested timeframe. Attend all Cybersecurity Workforce Meetings when requested. Perform as needed system administration on JLCCTC or other simulations or interface systems as needed. Perform as needed technical operations, setup and tear down of servers, systems and integration tools; maintaining RMF compliance; providing input to exercise design and technical planning products. Support as needed other set-up, transition, and break down for all training and training support activities pertaining to this task order. Participate in individual training, seminars, conferences, exercise/experiment planning events, site surveys, and exercise and training events and supports the planning and preparation processes and product development as needed. Requirements What you'll need to join our award-winning team: Clearance: Must possess and maintain an active U.S. Top Secret/SCI security clearance with the ability to pass a CI/Polygraph exam Education: A bachelor's degree plus 3 years of recent related experience OR an associate's degree plus 7 years of recent related experience OR a major certification plus 7 years of recent related experience OR 11 years of recent related experience. DoD Approved 8570 Baseline Certification for a minimum of IAM Level II. Five (5) years' experience within the past 10 years, in planning simulation exercise architectures, supervising implementation of communication systems, and integration of Army Mission Command Systems in support of distributed exercises. Five (5) years' experience in information technology management What Sets you apart: A working knowledge of RMF and the security authorization processes and procedures. Knowledge of NIST Special Publications and their counterparts, especially SP800- 37, SP800-53, ICD 503, and CNSS 1253. Ability to communicate clearly and present information to the customer in a format they can understand. Experience in several of the following areas: knowledge of current security tools, hardware and software security implementation; different communication protocols; and encryption techniques/tools. Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services. Must be able to prioritize tasks, deliver solutions on time and be a team player with the ability to work independently and proactively while being flexible and prioritizing competing priorities, often under time constraints. Have strong analysis, oral and written communication, and change management skills with ability to plan, organize, prioritize, track, manage, and learn new skills. It is preferred that a candidate have at least one year of experience under the DoD Information Assurance Certification and Accreditation Process (DIACAP) and/or Risk Management Framework (RMF) accreditation process and has a familiarity with Enterprise Mission Assurance Support Service (eMASS). Technical familiarity with Windows 7 Enterprise/Windows 10 Professional, Windows Server 2012, and Red Hat Linux. Experience with providing IA or IT support to a US Army client desirable, but not required. Proficiency with using the Internet and with Microsoft Office products including e-mail, Word, Excel, Access and Project is required. Outstanding work ethic and personal integrity. Superior analytical and problem-solving skills. Ability to document and update processes. Ability to perform tasks under deadlines. Ability to work with senior Government and Industry leaders. Possess a very high degree of attention to detail. Capable of working at a computer terminal for extended periods. Ability to work 12-hour shifts, day or night, for consecutive days up to 4 weeks. • Outstanding interpersonal and written communication skills.
    $78k-109k yearly est. 60d+ ago
  • Oracle Cloud IT Functional Analyst II - Fusion OM

    Niagara Water 4.5company rating

    Information security analyst job in Diamond Bar, CA

    At Niagara, we're looking for Team Members who want to be part of achieving our mission to provide our customers the highest quality most affordable bottled water. Consider applying here, if you want to: Work in an entrepreneurial and dynamic environment with a chance to make an impact. Develop lasting relationships with great people. Have the opportunity to build a satisfying career. We offer competitive compensation and benefits packages for our Team Members. Oracle Cloud IT Functional Analyst II - Fusion OMThe IT Functional Analyst II will work within the IT Team to support the overall system/ network needs of Niagara's corporate office and plants. Essential Functions Trouble shooting daily operational system issues to define root cause and define temporary/permanent solutions Work with the business to understand and gather requirements, document requirements, determine design and approach, configure, and test various applications to deliver and support business needs Ability to work in fast paced, dynamic environment collaboratively with a cross-functional team and manage minor project implementations On-going analysis of the supply chain process to identify opportunities for process and system improvements, efficiency gains, and cost reduction through the use of various supply chain applications and data mining tools Organize, schedule and run meetings to identify supply chain opportunities and system needs Interacting with multiple departments including but not limited to IT, Accounting, Finance, Transportation, Customer Service, Planning, Distribution, and Production Documenting meeting minutes, action items, issues, and risks Gathering requirements, Documenting requirements, process flows, new functionality, and creation of SOP/training materials Training super and end users on new functionality and process changes Ability to plan, track, escalate, and deliver upon tasks and timelines assigned Available for 24/7 support (scheduled and off hours) Review system design approaches to ensure they fully meet the business requirements Write use cases, business rules, and other artifacts such as swim lane diagrams and activity flow diagrams to effectively articulate and represent business processes, desired outcomes, and requirements Produce key documents, both in written and presentation format Excellent problem solver with the ability to keep many driving factors and requirements in focus Monitor and improve process and technology and provide insights into overall status Strong communication and documentation skills, ability to communicate and interact at executive and junior levels Review system design approaches to ensure they fully meet the business requirements Write use cases, business rules, and other artifacts such as swim lane diagrams and activity flow diagrams to effectively articulate and represent business processes, desired outcomes, and requirements. Produce key documents, both in written and presentation format. Excellent problem solver with the ability to keep many driving factors and requirements in focus Monitor process and technology and provide insights into overall status Train business users on new process and functionality Strong communication and documentation skills, ability to communicate and interact at executive and junior levels End to end Project Management throughout the project lifecycle: including administration, planning, configuration, testing, training, implementation, support, and change management Trouble shooting systemic and operational system issues to define root cause and determine temporary/permanent solutions Work with application vendors to identify/resolve application defects Work with internal and external stakeholder to identify system enhancements and gaps to design and build a sustainable solution Guide other IT resources as needed Proactively identify and address defects/issues independently Please note this job description is not designed to contain a comprehensive list of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without prior notice. Additionally, the IT Analyst is expected to demonstrate: Analyze and develop solutions addressing customer needs Experience in Business Analysis Overall high degree of professionalism Strong team-oriented interpersonal skills including facilitation and the ability to effectively interface and work with a wide variety of people. Must work independently Strong analytical, problem-solving skills and critical thinking skills Ability to translate complex business needs into use case models Ability to manage multiple priorities and projects Strong written and verbal communication skills including the ability to provide detail documentation of a technology incident Proficient computer skills (i.e. Microsoft Office, Outlook) Excellent interpersonal, communications and analysis skills, planning and organizational proficiency and good business judgment Ability to delivery effective and professional presentation to peers, management and other professionals within our field Qualifications Minimum Qualifications: 4-6 Years - Experience in Oracle ERP Cloud 4-6 Years - Experience managing projects *experience may include a combination of work experience and education Preferred Qualifications: 6-8 Years - Experience in Oracle ERP Cloud 6-8 Years - Experience managing projects *experience may include a combination of work experience and education Education Minimum Required: Bachelor's Degree in Computer Science or Engineering, related field, or equivalent work experience Preferred (Optimal Candidate): Master's Degree in Computer Science or Engineering, or related field or equivalent work experience Typical Compensation Range Pay Rate Type: Salary$100,464.14 - $145,673.02 / Yearly Benefits Our Total Rewards package is thoughtfully designed to support both you and your family: Regular full-time team members are offered a comprehensive benefits package, while part-time, intern, and seasonal team members are offered a limited benefits package. Paid Time Off for holidays, sick time, and vacation time Paid parental and caregiver leaves Medical, including virtual care options Dental Vision 401(k) with company match Health Savings Account with company match Flexible Spending Accounts Expanded mental wellbeing benefits including free counseling sessions for all team members and household family members Family Building Benefits including enhanced fertility benefits for IVF and fertility preservation plus adoption, surrogacy, and Doula reimbursements Income protection including Life and AD&D, short and long-term disability, critical illness and an accident plan Special discount programs including pet plans, pre-paid legal services, identity theft, car rental, airport parking, etc. Tuition reimbursement, college savings plan and scholarship opportunities And more! *********************************************** * *Los Angeles County applicants only** Qualified applicants with arrest or conviction records will be considered for employment in accordance with the Los Angeles County Fair Chance Ordinance for Employers, the California Fair Chance Act, and any other applicable local and state laws. Any employment agency, person or entity that submits a résumé into this career site or to a hiring manager does so with the understanding that the applicant's résumé will become the property of Niagara Bottling, LLC. Niagara Bottling, LLC will have the right to hire that applicant at its discretion without any fee owed to the submitting employment agency, person or entity. Employment agencies that have fee agreements with Niagara Bottling, LLC and have been engaged on a search shall submit résumé to the designated Niagara Bottling, LLC recruiter or, upon authorization, submit résumé into this career site to be eligible for placement fees.
    $100.5k-145.7k yearly Auto-Apply 18d ago
  • IT Analyst

    Firstservice Corporation 3.9company rating

    Information security analyst job in Irvine, CA

    The IT Systems Specialist position actively supports FirstService Residential philosophies and culture to staff, clients, and the community, enhancing the brand's image, reputation, differentiation, and professionalism. As an IT Specialist, the primary functions include supporting end-user technology and maintaining 100% availability of all IT related systems and software to provide Regional Offices and On-Site Locations with a competitive advantage, improved profitability, and exceptional customer service. Compensation: $26-$30hr FirstService Residential will compensate the successful candidate in accordance with the posted range. The salary or wage paid to the successful candidate will be commensurate with experience, education, and specific job responsibilities. For positions designated at a client's property, the salary or wage will also be premised upon the client's directive. The base pay range is subject to change and may be modified in the future. Job Responsibilities: To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Due to the nature of this role and technology these responsibilities may change over time. * Manage internal and external client relationships and expectations during escalated issue processes. * Effectively communicate pertinent information to the team, associates, and leadership as needed. * Document all work performed in ServiceDesk in a timely, accurate, and detailed manner, with follow-up to resolution. * Provide professional, courteous, and timely support and service to users/customers. * Occasionally travel to other offices and site locations as needed. * Active Directory - Manage user's accounts, permissions, reset passwords. Create and disable accounts. * Support Office 365 and Office applications (Outlook, Word, Excel). * Manage the maintenance of all hardware (desktops, laptops, printers, and peripherals) and software. * Be familiar with Citrix desktops and applications. * Use remote support tools (GoToAssist, ManageEngine) to troubleshoot and resolve issues. * Conduct user training sessions on an as-needed basis Skills & Qualifications: * Valid State Driver's License and mandated vehicle insurance. * Proficient in English; bilingual skills are helpful. * Expert level with Microsoft Windows 10/11. Proficient in Active Directory, Citrix, Office 365, and Microsoft applications. * Basic understanding of networks and troubleshooting * Strong customer orientation. * Excellent interpersonal and communication skills Education & Experience: * Experience in IT (1-3 years). * Combination of associate's degree and/or IT-related certifications (Microsoft, CompTIA) in a related field is desirable. Physical Requirements & Working Environment: The physical demands described here are representative of those that must be met by an associate to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. * Must be able to sit for extended periods of time. * Must be able to stand for extended periods of time. * Must be able to communicate both on the phone and in person with our clients in order to resolve issues and manage the business. * Must have finger dexterity for typing/using a keyboard. * Must be mobile enough to move around both the office in order to make copies, send mail and faxes and to walk around the property. This could include lengthy walks on uneven areas. * Talking and hearing occur continuously in the process of communicating with guests, supervisors, and other associates. Hours over and above normal office hours will occur, including evenings, holidays, and some weekends. Schedule is subject to change based on business needs. Tools & Equipment Used: * Must have access to and consistent use of a vehicle for transportation to client sites and local offices. * Computer and peripherals, standard and customized software applications and tools, and usual office equipment. Travel: * Must be able to travel locally to client sites in the field (Southern California) What We Offer: * Medical, dental, and vision plans (full time and part time 30+ hours) * Part time 20+ hours qualify for dental and vision * 401K match * Time off including vacation, sick, and company paid holidays * Pet insurance available * Tuition reimbursement * Legal services * Free emotional wellbeing and daily life assistance support for all associates * Domestic partner coverage * Health savings account * Flexible spending account About Us: FirstService Residential transforms the property management landscape by providing professional association management services to over 9,000 residential communities across the United States and Canada. Our dedication to associate satisfaction and growth is recognized by our Great Place to Work certification, exemplifying our commitment to fostering a positive and inclusive workplace culture. Our 19,000 associates can count on competitive salaries, top-tier medical, dental, and retirement benefits, career training, and support for continued professional development. Disclaimer: The above information in this description has been designed to indicate the general nature and level of work performed by employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of employees assigned to this job. This is not an all-inclusive job description; therefore, management has the right to assign or reassign schedules, duties, and responsibilities to this job at any time. FirstService Residential is an equal opportunity employer committed to a diverse and inclusive workforce. Applicants will receive consideration for employment without regard to race, color, religion, sex (including pregnancy), age, sexual orientation, national origin, marital status, parental status, ancestry, disability, gender identity, veteran status, genetic information, other distinguishing characteristics of diversity and inclusion, or any other protected status. Qualified applicants with arrest and/or conviction records will be considered for employment in a manner consistent with federal and state laws. All offers of employment with FirstService Residential are contingent upon a satisfactory background check.
    $26-30 hourly 21d ago
  • Information Security Analyst

    Vesync

    Information security analyst job in Tustin, CA

    The Company: VeSync is a portfolio company with brands that cover different categories of health & wellness products. We wouldn't be surprised if you have one of our Levoit air purifiers in your living room or a COSORI air fryer whipping up healthy and delicious meals for you every night. We're a young and energetic company, we've had tremendous success, and we are constantly growing our team. As we garner more industry attention - just check out our accomplishments and awards by CES Innovation, iF Design, IGA, and Red Dot - we also need driven and talented people to join our team. That brings us to you, and what you'll be joining. Our teams are smart and diligent and take ownership of their work - they're confident in their work but know how to collaborate with open ears and a spirit of learning. If you're down-to-earth, approachable, and easy to strike up a conversation with, this may be a great fit for you. Check out our brands:levoit.com | cosori.com | etekcity.com The Opportunity: The Information Security Analyst is responsible for supporting the organization's security posture by implementing, monitoring, and maintaining security controls across systems, networks, and cloud environments. This role works closely with senior security team members to identify risks, respond to incidents, and ensure compliance with security standards and regulatory requirements.What you will do at VeSync: Information Security Operations & Planning Support the implementation and maintenance of information security controls to protect company data and assets across on-premise and cloud environments. Assist in analyzing business processes, systems, and data flows to identify security gaps and improvement opportunities. Apply industry best practices and frameworks such as the NIST Cybersecurity Framework (CSF) to support confidentiality, integrity, and availability of information assets. Policy Support & Compliance Assist in the development, implementation, and maintenance of information security policies, standards, and procedures. Support compliance efforts with industry standards and regulations (e.g., ISO 27001, NIST, GDPR). Help track evidence and controls using compliance and GRC tools such as OneTrust, Drata, or similar platforms. Monitor regulatory and security trends and escalate relevant changes to senior team members. System, Network, and Cloud Security Monitor and help maintain security controls for systems, networks, and public cloud platforms (AWS, Azure, GCP). Assist with configuration, monitoring, and tuning of cloud security services and tools. Use security tools and dashboards (e.g., SIEM, security scorecards) to identify potential threats and vulnerabilities. Support AWS security services and baseline configurations. Security Monitoring & Incident Response Monitor security alerts and events using SIEM and security monitoring tools. Participate in incident response activities, including investigation, containment, remediation, and post-incident analysis. Assist with blue team activities, tabletop exercises, and response drills to improve readiness. Document incidents and lessons learned. Identity & Access Management Support user access reviews, permission audits, and access control processes. Assist with identity management systems to ensure appropriate authentication and authorization controls. Help identify and remediate excessive or inappropriate access. Risk Assessment & Vulnerability Management Participate in risk assessments and vulnerability identification efforts. Assist with vulnerability scanning, tracking, and remediation coordination. Support risk documentation and reporting aligned with frameworks such as NIST CSF. Help track and report basic security metrics and KPIs. Security Awareness & Documentation Support the delivery of security awareness training and phishing simulations. Assist in developing security documentation, including procedures, controls, detection rules, and response playbooks. Maintain clear and accurate security documentation for audits and operational use. What you bring to the role: Bachelor's degree in Information Security, Computer Science, or a related field (or equivalent experience). 3-6 years of experience in information security or a related IT/security role. Hands-on experience with security monitoring, incident response, vulnerability management, or risk assessment. Familiarity with cloud environments (AWS, Azure, or GCP) and basic cloud security concepts. Working knowledge of security frameworks and standards such as NIST CSF, ISO 27001, and CIS. Understanding of network security fundamentals, including firewalls, IDS/IPS, endpoint protection, and logging. Experience with SIEM or security monitoring tools such as Splunk, QRadar, Rapid7, or Wazuh. Strong analytical, troubleshooting, and communication skills. Preferred Qualifications Experience supporting compliance or audit activities. Familiarity with GRC or compliance automation tools (OneTrust, Drata, or similar). Relevant security certifications such as Security+, CEH, GSEC, or progress toward CISSP/CISM. Location: This is an on-site, office-based role in Tustin, CA. Salary: Starting at $90K Annually Perks and Benefits: 100% covered Medical/Dental/Vision insurance for employee AND spouse + dependents! 401K with 4% employer match (eligible after 90 days of employment) and immediate 100% vesting Generous PTO policy + paid holidays Life Insurance Voluntary Life Insurance Disability Insurance Critical Illness Coverage Accident Insurance Healthcare FSA Dependent Care FSA Travel Assistance Program Employee Assistance Program (EAP) Fully stocked kitchen
    $90k yearly Auto-Apply 4d ago
  • Sr. Security Compliance Analyst

    TP-Link Systems Inc. 3.9company rating

    Information security analyst job in Irvine, CA

    Job Description Headquartered in the United States, TP-Link Systems Inc. is a leading global provider of networking devices and smart home products. Consistently ranked as the world's top provider of Wi-Fi devices, TP-Link is dedicated to delivering innovative solutions that improve people's lives by offering faster, more reliable connectivity. Serving customers in over 170 countries, we are committed to expanding our global footprint. At TP-Link Systems Inc., we believe that technology has the power to transform the world for the better. Our mission is to design reliable, high-performance products that connect users worldwide to the limitless possibilities of technology. We are driven by our core values of professionalism, innovation, excellence, and simplicity. Our goal is to help clients achieve outstanding global performance and to provide consumers with a seamless, effortless technology experience. TP-Link Systems Inc. is seeking a skilled and proactive Sr. Security Compliance Analyst who will be responsible for developing and overseeing TP-Link's enterprise security governance framework, ensuring compliance with regulatory requirements, industry standards, and internal policies. This individual will collaborate with cross-functional teams to embed security into business operations, manage risk, and enhance security resilience across TP-Link's enterprise ecosystem. Key Responsibilities: Security Governance & Policy Development Develop, implement, and maintain security policies, standards, and guidelines aligned with industry best practices (e.g., NIST, ISO 27001, CIS). Establish and lead a security governance framework to ensure consistent application of security controls across the enterprise. Risk Management & Compliance Identify, assess, and mitigate security risks across TP-Link's global operations. Ensure compliance with regulatory requirements such as GDPR, CCPA, NIST CSF, and other applicable cybersecurity frameworks. Oversee security audits, risk assessments, and third-party security evaluations. Partner with legal, IT, and business leaders to address security compliance gaps. Third-Party & Supply Chain Security Develop and enforce security requirements for vendors, suppliers, and third-party partners. Conduct security assessments of supply chain partners to identify and mitigate potential risks. Security Awareness & Training Develop and lead security awareness programs to educate employees on cybersecurity risks and best practices. Foster a security-first culture across all levels of the organization. Provide guidance and training on security governance processes for internal stakeholders. Incident Response & Continuous Improvement Support security incident response efforts by ensuring governance processes facilitate rapid detection and response. Lead post-incident analysis to refine security policies and controls. Monitor emerging threats, regulatory changes, and industry trends to evolve TP-Link's security governance strategies. Requirements Qualifications Education: Bachelor's degree in Computer Science, Cybersecurity, Information Security, or a related field. Experience: 5+ years of experience in security governance, risk management, or compliance in a global technology or networking company. Proven track record in developing and implementing security governance frameworks for enterprise security. Experience managing compliance with industry standards and regulations (ISO 27001, NIST CSF, SOC 2, GDPR, CCPA, etc.). Hands-on experience with supply chain security, third-party risk management, and vendor security assessments. Skills: Deep understanding of security frameworks (ISO 27001, NIST, CIS, SOC 2) and regulatory requirements. Strong expertise in risk management methodologies, security policy development, and compliance auditing. Proficient in conducting security assessments, third-party risk evaluations, and internal security reviews. Ability to communicate complex security concepts to business and technical stakeholders effectively. Strong leadership skills with experience in cross-functional collaboration and executive reporting. Benefits Salary range: $100,000-$150,000 Free snacks and drinks, and provided lunch on Fridays Fully paid medical, dental, and vision insurance (partial coverage for dependents) Contributions to 401k funds Bi-annual reviews, and annual pay increases Health and wellness benefits, including free gym membership Quarterly team-building events At TP-Link Systems Inc., we are continually searching for ambitious individuals who are passionate about their work. We believe that diversity fuels innovation, collaboration, and drives our entrepreneurial spirit. As a global company, we highly value diverse perspectives and are committed to cultivating an environment where all voices are heard, respected, and valued. We are dedicated to providing equal employment opportunities to all employees and applicants, and we prohibit discrimination and harassment of any kind based on race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Beyond compliance, we strive to create a supportive and growth-oriented workplace for everyone. If you share our passion and connection to this mission, we welcome you to apply and join us in building a vibrant and inclusive team at TP-Link Systems Inc. Please, no third-party agency inquiries, and we are unable to offer visa sponsorships at this time.
    $100k-150k yearly 11d ago
  • Information Security Analyst

    Cathay General Bancorp 4.4company rating

    Information security analyst job in Rancho Cucamonga, CA

    This position is responsible for ensuring that the Bank's Security operations and preventive controls are managed and maintained in accordance with established Information Security policies, standards and procedures, published regulations and industry best practices. Primarily responsible for the constant review of vendor security controls in comparison with policies and industry frameworks, risk assessments, determination of control gaps and their remediation. ESSENTIAL FUNCTIONS Performs vendor security risk assessments to determine inherent risk on proposed projects and assesses vendor security controls to determine residual risk. Evaluates the potential exposure to application security risks and threats based on industry security frameworks and recommends appropriate mitigation. Assesses security practices including Information Security governance, Identity and access control, Incident monitoring and response, Vulnerability assessment and Penetration tests, Network Security and Endpoint Security, among others. Acts as liaison with Third Party Risk Management, Information Technology and business department Relationship Managers related to vendor risk assessments. Reports information security risks and follows-up remediations. Remediates audit and regulatory findings and recommendations related to Information Security and Vendor Risk Management. QUALIFICATIONS Education: College degree in Information Technology or Information Security or equivalent; Security+, SSCP, CISSP, CISM or similar information security certifications preferred. Experience: Minimum two years of experience in Information Security Risk, Information Security Operations or Security Auditing. Proven experience on third-party risk management and vendor security assessments. Working knowledge of security practices such as Endpoint Security, Network Security, Security Operations and Security Governance required. Experience working with Vendor Risk Management (VRM) applications preferred. Skills/Ability: Proven ability to initiate and manage projects. Excellent communication and problem-solving skills. Strong inter-personal communication and collaboration skills. Self-starter, highly motivated, and able to work with general supervision. OTHER DETAILS $28.84 - $33.65 / hour Pay determined based on job-related knowledge, skills, experience, and location. This position may be eligible for a discretionary bonus.
    $28.8-33.7 hourly 29d ago
  • Sr. Information Security GRC Analyst

    Loandepot 4.7company rating

    Information security analyst job in Irvine, CA

    at loan Depot Responsible for driving the development, implementation, communication, and maintenance of loan Depot's technology policies, standards and procedures that are aligned to industry standards and regulatory requirements. Ensures that loan Depot technology processes adheres to regulatory requirements, manages risks effectively, and establishes strong governance practices. Develops and implements controls, monitors compliance, and supports risk management activities. Responsibilities: Leads the development and implementation of comprehensive cybersecurity and IT policies, standards, and guidelines. Continuously evaluates and updates cybersecurity and IT policies to ensure they remain current and effective. Ensures policies comply with relevant laws, regulations, and industry standards (e.g., NIST, FFIEC, GLBA, NYDFS, SOX and PCI-DSS). Collaborates with teams, working closely with IT, legal, compliance, and other departments, to gain a deep understanding of business needs to ensure cybersecurity policies align with business objectives. Transforms complex information and documentation into simple concepts that are easy to understand by the end-users. Offers specialized expertise and consultation to cross-functional teams to perform framework-oriented risk assessments, identify deficiencies, generate reports, and recommends prioritized, actionable solutions to mitigate risks and enhance loan Depot's overall security posture. Stays informed about the latest cybersecurity threats, trends, and best practices. Ensures accurate and up-to-date records of policy reviews, risk assessments, training activities, and incident responses. Benchmarks the organization's policies against industry standards and best practices. Develops and implements governance frameworks for cybersecurity policy management. Monitors key performance indicators, conducts gap analysis, risk assessments and implements frameworks, as needed. Tests and monitors effectiveness of controls. Establishes a feedback loop and analyzes metrics to continuously improve cybersecurity policies based on audit findings, incident reviews, and emerging threats. Actively leads and supports on internal and external audits and assessments of cybersecurity policies and practices. Accountable for ensuring identified audit and assessment findings and actions are tracked to closure. Maintains comprehensive documentation of all cybersecurity policies, procedures, and related activities. Communicates policy requirements and updates to all relevant stakeholders. Identifies opportunities for innovation and improvement in cybersecurity policy and practice. Proposes suitable mitigation strategies and verifies the effectiveness of remediation plans Requirements: Bachelor's Degree in Information Security, Computer Science, Information Technology, or a related field preferred. Minimum of six (6) + years' experience working in Cybersecurity GRC, policy development, risk management, or a similar field. Experience with GRC tools (e.g., Archer, ServiceNow, OneTrust). Proficiency in using data analysis and reporting tools (e.g., Excel, Power BI). Relevant certifications such as CISM and/or CISA are highly desirable. Why work for #teamloan Depot: Competitive compensation package based on experience, skillset and overall fit for #TeamloanDepot. Inclusive, diverse, and collaborative culture where people from all backgrounds can thrive Work with other passionate, purposeful, and customer-centric people Extensive internal growth and professional development opportunities including tuition reimbursement Comprehensive benefits package including Medical/Dental/Vision Wellness program to support both mental and physical health Generous paid time off for both exempt and non-exempt positions About loan Depot: loan Depot (NYSE: LDI) is a digital commerce company committed to serving its customers throughout the home ownership journey. Since its launch in 2010, loan Depot has revolutionized the mortgage industry with a digital-first approach that makes it easier, faster, and less stressful to purchase or refinance a home. Today, as the nation's second largest non-bank retail mortgage lender, loan Depot enables customers to achieve the American dream of homeownership through a broad suite of lending and real estate services that simplify one of life's most complex transactions. With headquarters in Southern California and offices nationwide, loan Depot is committed to serving the communities in which its team lives and works through a variety of local, regional, and national philanthropic efforts. Base pay is one part of our total compensation package and is determined within a range. This provides the opportunity to progress as you grow and develop within a role. The base pay for this role is between $99,000 and $136,500. Your base pay will depend on multiple individualized factors, including your job-related knowledge/skills, qualifications, experience, and market location. We are an equal opportunity employer and value diversity in our company. We do not discriminate based on race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
    $99k-136.5k yearly Auto-Apply 60d+ ago
  • Senior Security Engineer

    Goodleap 4.6company rating

    Information security analyst job in Irvine, CA

    About GoodLeap:GoodLeap is a technology company delivering best-in-class financing and software products for sustainable solutions, from solar panels and batteries to energy-efficient HVAC, heat pumps, roofing, windows, and more. Over 1 million homeowners have benefited from our simple, fast, and frictionless technology that makes the adoption of these products more affordable, accessible, and easier to understand. Thousands of professionals deploying home efficiency and solar solutions rely on GoodLeap's proprietary, AI-powered applications and developer tools to drive more transparent customer communication, deeper business intelligence, and streamlined payment and operations. Our platform has led to more than $30 billion in financing for sustainable solutions since 2018. GoodLeap is also proud to support our award-winning nonprofit, GivePower, which is building and deploying life-saving water and clean electricity systems, changing the lives of more than 1.6 million people across Africa, Asia, and South America. Position Summary The GoodLeap security team is responsible for both business enablement and safeguarding the organization's information assets; it is involved in virtually all aspects of the business, from product safety and resilience, to building security paved roads, customer, partner, and regulatory trust, managing technology governance and compliance, and ensuring the privacy, and safety of GoodLeap's customers, partners, and employees information. The senior security engineer role provides a unique opportunity to shape the security and resilience of GoodLeap corporate systems, services, and operational processes. In this role, you will work closely with product, engineering, IT, and business teams within GoodLeap, acting as the key individual with both the authority and responsibility to ensure the safety and resilience of enterprise systems, products, and services. Your oversight will encompass: - Enterprise systems:Identifying potential misuse and abuse cases, proposing solutions to address these scenarios, and identifying product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. - Build-time controls: Managing applications/products security controls and activities during development. - Runtime controls: Overseeing security measures at runtime, from prevention to detection and response. Additionally, you will be involved with aspects of internally built products and represent all areas of security, spanning governance, risk, and compliance (GRC) to security monitoring, for a number of departments/teams. You will also have the authority and ability to involve other security team members as needed. While you will take on multiple responsibilities-from advisor to builder and beyond-your primary focus will be designing and building security patterns and practices for services and processes, and fostering strong relationships with product, business, and engineering. Essential Job Duties & Responsibilities Lead, participate in, and contribute to partnerships between security, IT, General & Administrative teams, engineering, product, and operations teams to build, orchestrate, and automate security controls and services in GoodLeap enterprise systems, products, services, and operational processes. Identify potential misuse and abuse cases in enterprise systems, propose solutions to address these scenarios, and identify product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. Support or develop components of the security analytics platform. Contribute to investigations, threat hunting, and incident response activities in a supporting role. Collaborate with the monitoring and response team to create playbooks for specific incident response scenarios related to the products and services you oversee. These investigations, incidents, and playbooks may address security, fraud, privacy, resilience, and related concerns. Support the security operations team with the vulnerability management lifecycle for products and services under your purview. Ensure technical alignment for the products and services you oversee with team initiatives, including GRC, security operations, and monitoring and response activities. Required Skills, Knowledge & Abilities Strong communicator with the ability to lead technical architecture discussions, drive technical decisions, and effectively communicate with non-technical audiences. Expertise in agile product lifecycles. Ideally, you have experience in a product manager or engineering manager role and understand how SaaS products (B2B, B2B2C, and B2C) are built, including roadmap planning and feature and defect prioritization. Experience with threat modeling methodologies, with the ability to create efficient and scalable approaches to conducting such assessments. Familiarity with AWS services, including KMS, SST, Container Registry, ELBs, Lambda, API Gateway, CloudTrail, and IAM (knowledge of GCP and/or Azure is a plus). Proven ability to establish credibility and build trust with business, engineers, and operational staff; confident yet humble. Hands-on experience with managing security for core enterprise systems, e.g., ERP, HCM, Salesforce, etc. Strong understanding of both human and non-human identity management and common enterprise and consumer authentication standards and use cases. Practical experience with CI/CD pipelines and DevOps tools, including Infrastructure-as-Code (IaC) tools like Terraform, Pulumi, or CDK; GitHub and GitHub Actions; artifact management; and secrets management tools like Doppler and HashiCorp Vault. Passionate about learning new technologies. While you're not expected to know everything, you should demonstrate a willingness and ability to learn as needed. Prior experience interfacing and supporting with G&A teams, internal product teams, and other cross-functional areas. Proficiency in writing automation scripts in multiple languages, with prior experience automating security processes in cloud or SaaS environments. Experience engaging with vendors in design partnerships. Experience overseeing vulnerability and threat management at the platform and application levels. Familiarity with penetration testing and red team exercises, including manual verification, exploitation, and lateral movement. Ability to balance a high-level view of security strategy with attention to detail, ensuring thorough and effective execution. Additional Information Regarding Job Duties and s: Job duties include additional responsibilities as assigned by one's supervisor or other managers related to the position/department. This job description is meant to describe the general nature and level of work being performed; it is not intended to be construed as an exhaustive list of all responsibilities, duties and other skills required for the position. The Company reserves the right at any time with or without notice to alter or change job responsibilities, reassign or transfer job position or assign additional job responsibilities, subject to applicable law. The Company shall provide reasonable accommodations of known disabilities to enable a qualified applicant or employee to apply for employment, perform the essential functions of the job, or enjoy the benefits and privileges of employment as required by the law. If you are an extraordinary professional who thrives in a collaborative work culture and values a rewarding career, then we want to work with you! Apply today! We are committed to protecting your privacy. To learn more about how we collect, use, and safeguard your personal information during the application process, please review our Employment Privacy Policy and Recruiting Policy on AI.
    $114k-145k yearly est. Auto-Apply 60d+ ago
  • Information Security Analyst

    Cathay Bank 4.4company rating

    Information security analyst job in Rancho Cucamonga, CA

    This position is responsible for ensuring that the Bank's Security operations and preventive controls are managed and maintained in accordance with established Information Security policies, standards and procedures, published regulations and industry best practices. Primarily responsible for the constant review of vendor security controls in comparison with policies and industry frameworks, risk assessments, determination of control gaps and their remediation. ESSENTIAL FUNCTIONS Performs vendor security risk assessments to determine inherent risk on proposed projects and assesses vendor security controls to determine residual risk. Evaluates the potential exposure to application security risks and threats based on industry security frameworks and recommends appropriate mitigation. Assesses security practices including Information Security governance, Identity and access control, Incident monitoring and response, Vulnerability assessment and Penetration tests, Network Security and Endpoint Security, among others. Acts as liaison with Third Party Risk Management, Information Technology and business department Relationship Managers related to vendor risk assessments. Reports information security risks and follows-up remediations. Remediates audit and regulatory findings and recommendations related to Information Security and Vendor Risk Management. QUALIFICATIONS Education: College degree in Information Technology or Information Security or equivalent; Security+, SSCP, CISSP, CISM or similar information security certifications preferred. Experience: Minimum two years of experience in Information Security Risk, Information Security Operations or Security Auditing. Proven experience on third-party risk management and vendor security assessments. Working knowledge of security practices such as Endpoint Security, Network Security, Security Operations and Security Governance required. Experience working with Vendor Risk Management (VRM) applications preferred. Skills/Ability: Proven ability to initiate and manage projects. Excellent communication and problem-solving skills. Strong inter-personal communication and collaboration skills. Self-starter, highly motivated, and able to work with general supervision. OTHER DETAILS $28.84 - $33.65 / hour Pay determined based on job-related knowledge, skills, experience, and location. This position may be eligible for a discretionary bonus.
    $28.8-33.7 hourly 8d ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Loma Linda, CA?

The average information security analyst in Loma Linda, CA earns between $75,000 and $155,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Loma Linda, CA

$108,000
Job type you want
Full Time
Part Time
Internship
Temporary