Personnel Security Specialist
Security architect job in Los Angeles, CA
MANTECH seeks a motivated, career and customer-oriented Personnel Security Specialist II to join our team in El Segundo, CA.
The Personnel Security Specialist's primary function is to handle personnel security functions in support of the customer's facility and organization. The position will provide day to day PERSEC services for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Responsibilities include but are not limited to:
Build and Maintain tracking spreadsheets/databases for customer PERSEC activities.
Provide support for the security awareness and education programs.
Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Government Security Representative.
Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions.
Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access.
Perform data entry and record checks in the Joint Access Database (JADE) and maintain all customer sponsored personnel access information.
Receive and/or transmit classified visit requests as necessary to meet customer needs.
Minimum Qualifications:
Bachelor's degree; an additional 4 years of related experience might be considered for a degree.
6 + years of related experience.
4 + years of relevant SCI or SAP experience.
Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents.
Clearance Requirements:
Current Top Secret Clearance with SCI Eligibility.
Eligibility for access to Special Access Program Information.
Willingness to submit to a Counterintelligence polygraph.
Physical Requirements:
Must be able to remain in a stationary position 50%.
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
Security Architect
Security architect job in Santa Ana, CA
1. Security, Compliance and Audit Readiness
a. Enforce network security controls aligned with Criminal Justice Information Services (“CJIS”), National Institute of Standards and Technology (“NIST”), and department policy.
b. Implement and maintain firewall rulesets, Network Access Control (“NAC”) solutions (e.g., Cisco Identity Service Engine (“ISE”)), and endpoint access policies.
c. Support the cybersecurity team in incident detection, forensic analysis, and mitigation strategies.
d. Provide documentation and evidence for security audits and compliance reviews.
2. Implementation, Operations and Support
a. Serve as the hands-on engineer for network deployment, upgrades, and incident response.
b. Configure and manage Cisco switches, routers, firewalls, WLCs, and wireless endpoints.
c. Design and manage VPNs, QoS, ACLs, network monitoring, and logging systems (SolarWinds, NetFlow, SNMP).
3. SME Leadership and Staff Development
a. Serve as the department's SME on enterprise security, guiding decisions across IT, public safety systems, and operations.
b. Train, coach, and mentor internal IT staff, including junior and mid-level network technicians.
c. Lead structured knowledge transfer sessions, hands-on training, and real-time coaching during support and implementation activities.
d. Create SOPs, how-to guides, and step-by-step documentation tailored for ongoing use by internal staff.
e. Support staff in preparation for certification paths (e.g., CCNA/CCNP) if desired.
4. Any other activities reasonably related to the foregoing, as assigned by OCSD.
Security Architect
Security architect job in Torrance, CA
Cloud Security
AI Security
Container Security
Cyber Risk Assessment
Identity and Access Management (IAM)
DevSecOps
CISSP / CCSP / CISA / CCNP (Certifications)
Daily Tasks Performed:
• Security Design and Architecture: Knowledge of security design and architecture for organizational systems to meet defined cybersecurity needs; ability to embed security principles into the design goals while minimizing the risk from cyber security threats and vulnerabilities.
• Cross-functional Collaboration: Knowledge of collaborative techniques and approaches; ability to promote a culture of continuous improvement and working together across functions to solve business problems and meet business goals.
• Frameworks and Industry Standards: Knowledge of cybersecurity enterprise programs, policies, and standards to govern the organization's approach towards protecting their systems; Ability to align them with regulations, organization's context, operating environment, and cyber threats.
• Communicating Complex Concepts: Knowledge of effective presentation tools and techniques to ensure clear understanding; ability to use summarization and simplification techniques to explain complex technical concepts in simple, clear language appropriate to the audience.
• Domain Knowledge: Knowledge of a specific domain, its current trends, directions, and regulatory considerations; ability to apply domain-specific knowledge to relevant situations.
• Technical Excellence: Knowledge of a given technology and various application methods; ability to develop and provide solutions to significant technical challenges
• Cybersecurity Expertise: Knowledge of the processes, tools, and techniques in the cybersecurity domain; ability to deploy and monitor cybersecurity measures, while detecting, controlling, and preventing cybersecurity breaches.
What this person will be working on:
This is a Security architect role and will include Cloud Security, AI Security, endpoint security, Network security and other security domain areas as needed
Position Success Criteria (Desired) - 'WANTS'
Qualification:
IS related bachelor's degree and/or equivalent work experience.
5+ years of IT business work experience
Desired Certifications: CISSP, CCSP, CCNP, CISA, or equivalent are highly desirable
• Problem Solving: Knowledge of approaches, tools, techniques for recognizing, anticipating, and resolving organizational, operational or process problems; ability to apply knowledge of problem solving appropriately to diverse situations.
• Conceptual Thinking: Knowledge of thinking and reasoning at a conceptual level; ability to identify the critical ideas and interdependencies among system elements that impact performance.
• Cloud Security: Knowledge of tools, technologies, and processes of cloud security; ability to minimize security risks to secure cloud computing services.
• Container Security: Knowledge of containerization technologies, secure image practices, runtime security, secure networking, and incident response; ability to design, develop, and implement secure container environments, while assessing risks, leading audits, and advocating for best practices, enables effective protection of containerized environments.
• AI Security: Designs secure architectures for Gen AI systems with a focus on threat modeling, data protection, and adversarial risk mitigation. Ensures secure deployment, access control, and compliance with AI governance and regulatory standards. Collaborates cross-functionally to embed security across the AI/ML lifecycle. Knowledge of tools, technologies related to AI development and security.
• Cyber Risk Assessment and Mitigation: Knowledge of cyber risk assessment and mitigation strategies across the systems' life cycle; ability to assess risks timely and propose countermeasures.
• Threat Analysis and Defense: Knowledge of characteristics, behaviors, capabilities, intent, and interactions of incoming cyber threats; ability to analyze the threats and develop defense and mitigation strategies to effectively combat such threats.
• Identity and Access Management: Knowledge of security administration; ability to manage access to computers, infrastructure, networks, and applications.
• DevSecOp: Knowledge of concept, principles, methodologies of DevSecOps; ability to utilize related tools and techniques to integrate security into DevOps processes.
Senior Security Architect
Security architect job in Santa Ana, CA
100% on-site in Santa Ana, CA
Interview Schedule: 1 round- virtual, potential 2 being onsite Interview
Contract Type: 18 months
Security, Compliance, and Audit Readiness
Enforce network security controls aligned with Criminal Justice Information Services (“CJIS”), National Institute of Standards and Technology (“NIST”), and department policy.
Implement and maintain firewall rulesets, Network Access Control (“NAC”) solutions (e.g., Cisco Identity Service Engine (“ISE”)), and endpoint access policies.
Support the cybersecurity team in incident detection, forensic analysis, and mitigation strategies.
Provide documentation and evidence for security audits and compliance reviews.
Implementation, Operations, and Support
Serve as the hands-on engineer for network deployment, upgrades, and incident response.
Configure and manage Cisco switches, routers, firewalls, WLCs, and wireless endpoints.
Design and manage VPNs, QoS, ACLs, network monitoring, and logging systems (SolarWinds, NetFlow, SNMP).
Strong technical and leadership experience in cybersecurity, with hands-on expertise in Incident Response, SIEM technologies, O365 Security Architecture and policy administration, and SIEM engineering.
Senior Security Architect
Security architect job in Santa Ana, CA
Job Title: Senior Security Architect
Contract Duration: 18 Months
Work Schedule: Monday-Friday, 8:00 AM - 5:00 PM
Interview Process: 1 round virtual, possible 2nd round onsite
Employment Type: Contract (C2C)
Work Authorization: U.S. Citizens or Green Card holders only
Role Overview
We are seeking a highly experienced Senior Security Architect to support a confidential law enforcement agency. This is a fully onsite role requiring strong hands-on cybersecurity architecture expertise, leadership capability, and experience working in regulated or government environments. Candidates must be able to successfully complete Live Scan and background checks.
Required Skills & Experience
7-10 years of combined network engineering and cybersecurity experience
Strong hands-on experience with:
Palo Alto Technologies (NGFW, Panorama, Cortex EDR, Cortex XSOAR, Prisma Cloud)
Cisco Networking (Switches, Routers, Firewalls, WLCs, VPNs)
SIEM technologies and security incident response
Cisco ISE, CyberArk, Tenable
AWS and Azure
Microsoft O365 Security Architecture
Azure Entra ID
ServiceNow
Terraform
Experience with:
Firewall consolidation, migrations, and redesigns
VPN deployments (site-to-site, remote access, third-party integrations)
Wireless security (corporate Wi-Fi, BYOD, IOC)
Network monitoring tools (SolarWinds, NetFlow, SNMP)
Proven leadership experience mentoring and guiding technical teams
Compliance & Security Experience
Strong background in CJIS, NIST, NAC, and audit readiness
Experience supporting law enforcement, public safety, federal, or government environments
Ability to pass Live Scan and comprehensive background checks (no exceptions)
Nice-to-Have Qualifications
Advanced CJIS/NIST compliance and audit experience
Experience creating training programs and mentoring staff toward certifications (CCNA/CCNP)
Strong documentation and communication skills
Prior work in enterprise, public safety, or government networks
Senior Security Architect
Security architect job in Santa Ana, CA
100% On-site | Santa Ana, CA
We are seeking a Senior Security Architect to lead enterprise security operations, compliance, and infrastructure within a mission-critical environment. This hands-on leadership role combines deep Cisco networking expertise, security architecture design, and staff mentorship to ensure audit readiness and operational excellence.
Key Responsibilities:
• Enforce and maintain network security controls aligned with CJIS, NIST, and internal policy frameworks.
• Implement and manage firewall rules, NAC solutions (e.g., Cisco ISE), and endpoint access policies.
• Support incident detection, forensics, and mitigation efforts alongside cybersecurity teams.
• Lead network deployments, upgrades, and response initiatives across Cisco infrastructure.
• Configure and manage switches, routers, firewalls, WLCs, and VPNs.
• Design and optimize QoS, ACLs, and network monitoring (SolarWinds, NetFlow, SNMP).
• Act as a Subject Matter Expert (SME), mentoring internal IT staff and guiding certification readiness (CCNA/CCNP).
• Create and maintain SOPs, documentation, and training materials for ongoing operations.
Top Skills Required:
• Cisco networking (switches, routers, firewalls, WLCs, VPNs)
• Security & compliance (CJIS, NIST, NAC, audit readiness)
• Network monitoring (SolarWinds, NetFlow, SNMP, ACLs, QoS)
• Leadership & mentoring (staff training, documentation, SME guidance)
Nice-to-Have:
• Advanced CJIS/NIST compliance experience
• Public safety or government network background
• Proven mentorship and SOP development experience
#SecurityArchitect #NetworkSecurity #CiscoJobs #CJIS #NIST #Cybersecurity #SolarWinds #NetworkEngineer #OnsiteJobs #CaliforniaJobs #ITLeadership #InformationSecurity #InfrastructureSecurity
IT Security and Network Engineer
Security architect job in Los Angeles, CA
IT Security & Network Engineer - JM Eagle
Los Angeles, CA | Onsite 4 Days / Remote Fridays | $150,000 - $170,000 + Comprehensive Benefits
About Us
JM Eagle is the world's largest manufacturer of plastic pipe, providing the infrastructure that keeps communities connected across North America. Behind every operation is a secure, stable IT environment supporting 1,000+ users across 20+ locations.
We're strengthening that foundation - and seeking a hands-on IT Security & Network Engineer who can own our daily security operations and help modernize our network and cybersecurity posture.
This is a high-impact, individual contributor role for a senior engineer who thrives in both the strategic and technical trenches.
The Opportunity
This role is ideal for a seasoned IT security professional who wants broad ownership without stepping into management. You'll work closely with the Director of IT Operations and outsourced partners to secure our enterprise, harden our infrastructure, and enhance our cybersecurity frameworks.
Your time will be split approximately:
60% Cybersecurity: tools, monitoring, vulnerability management, incident response
40% Network Engineering: SD-WAN, firewalls, VPN, wireless, connectivity across 20+ sites
You will be the technical driver behind our security improvement roadmap.
What You'll Do
Cybersecurity Operations
Own day-to-day cybersecurity operations, including monitoring, threat response, and risk mitigation.
Manage security tools and platforms: endpoint protection, SIEM, MFA, SSO, VPN, firewalls, and vulnerability management tools.
Perform recurring vulnerability scans and penetration-testing coordination; track and validate remediation.
Monitor security alerts using Fortinet, Darktrace, CrowdStrike, Nessus, Microsoft Defender, etc.
Lead internal security awareness initiatives and social engineering simulations.
Maintain documentation for configurations, policies, and security processes.
Network Engineering
Support secure network architecture across 20+ locations.
Oversee SD-WAN, firewall policies, VPN configuration, internet filtering, and remote-access security.
Support wireless infrastructure, site connectivity, and network performance monitoring.
Partner with third-party providers to ensure uptime, reliability, and strong security posture.
Governance & Collaboration
Work with IT leadership to strengthen cybersecurity governance and reporting.
Contribute to incident response planning, tabletop exercises, and monthly security briefings.
Evaluate threats and emerging technologies; propose continuous improvements.
What You Bring
Bachelor's degree in Computer Science, Information Systems, or equivalent experience.
8+ years of experience in IT security and network engineering supporting 1,000+ users across distributed sites.
4+ years of hands-on experience with enterprise security tools and platforms.
Deep experience with the Microsoft ecosystem: Azure, M365, Active Directory / Entra ID, SCCM / Intune.
Strong working knowledge of:
MFA, SSO, VPN
Endpoint protection
SIEM solutions
Network segmentation, encryption, hardening
Monitor and respond to security alerts using tools like Fortinet, Darktrace, CrowdStrike, Nessus, and Microsoft Defender.
Familiarity with SD-WAN architectures, wireless networking, and network monitoring tools.
Understanding of ITIL, ITSM, NIST frameworks; CISSP or similar preferred but not required.
Excellent communication skills with the ability to work across teams.
Comfort managing outsourced security and network service providers.
A highly proactive, self-starting approach - someone who solves problems end-to-end.
Why JM Eagle
Directly influence and modernize the cybersecurity posture of the world's largest pipe manufacturer.
Join an enterprise undergoing major IT transformation with full executive backing.
Work with a Microsoft-centric environment supporting 1,000+ users and 20+ distributed locations.
Competitive salary: $150K-$170K + bonus + excellent benefits.
4 days onsite in Los Angeles; remote Fridays.
Work Environment
Primarily a professional headquarters environment. Occasional travel to manufacturing and distribution facilities may be required. Some exposure to plant or outdoor areas during site visits.
Information Systems Security Manager (ISSM)
Security architect job in Torrance, CA
Castelion is bringing a new approach to defense development and production: one that focuses on short, iterative design cycles, rapid testing in development, and modern commercial manufacturing strategies for production at scale. We're designing, building, and testing next generation long range strike weapons systems to give America and its Allies a definitive edge and deter future conflicts.
Information Systems Security Manager (ISSM)
*This position requires a TS/SCI Clearance and Special Access Program Experience*
Castelion Corporation is looking for an experienced ISSM to manage and maintain the Classified Networks out of our Torrance location. The ideal candidate will be a dedicated security professional with a demonstrated ability to work independently and as a member of a team in a fast-paced, high-tech environment.
The ISSM's primary function serves as a principal expert and manager on all matters, technical and otherwise, involving the security of information systems under his/her purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, NAVY, Army, DARPA, etc. The position will provide "day-to-day" support, oversight, and maintenance for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
As the site ISSM you will own the end-to-end Information Assurance Program for all classified and controlled information systems at our Torrance facility. You will partner with Program Management, Engineering, IT, Security, and the Cognizant Security Agency (DCSA/SAPCO) to obtain and sustain ATO on schedule, mentor a growing ISSO team, and keep our environment audit ready every day.
Responsibilities
Lead RMF/JSIG/DAAPM execution architect secure solutions, prepare authorization packages, brief Security Control Assessments, and drive POA&M closure.
Own continuous monitoring vulnerability & patch management (ACAS/Nessus, SCAP, STIGs), log analysis (Splunk), account management, media control, incident response, and annual self-inspection.
Shape early program decisions embed with PMO to define security requirements, supply secure-by-design input at PDR/CDR/TRR, and influence contract CDRLs.
Develop people & process coach ISSOs/ISSEs, refine SOPs, track metrics, and present status to senior leadership and customers.
Interface with external stakeholders act as the single voice to DCSA, SAPCO, and other Cognizant Security Agencies for all cybersecurity matters.
Develop Assured File Transfer (AFT) in accordance with JSIG
Conduct all self-inspections and report findings to Cognizant Security Agency annually
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning
Maintain a and/or applicable repository for all system authorization documentation and modifications
Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents
Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements
Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed
Assess changes in the system, its environment, and operational needs that could affect the authorization
Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview
Review AIS assessment plans
Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)
Conduct periodic assessments of the security posture of the authorization boundaries
Institute and implement a Configuration Control Board (CCB) charter
Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented.
Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)
Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination
Ensure all authorization documentation is current and accessible to properly authorized individuals
Ensure that system security requirements are addressed during all phases of the system life cycle
Basic Qualifications
A degree in Science, Technology, Engineering or Mathematics (STEM), information technology and a minimum of 5 years of prior relevant experience.
5 years in DoD/IC Cybersecurity as ISSM and must meet position and certification requirements outlined in DoD Directive 8570.01-M for IAM-III within 6 months of the date of hire (CISSP, CISM, GSLC).
Proven delivery of ATO for SAP or SCI systems; prior Enterprise ISSM experience.
Active and transferable U.S. government issued Top Secret SCI (TS/SCI) security clearance required prior to start date.
Finalized CI polygraph, or willingness to submit to one
U.S. citizenship is required
Preferred Skills and Experience
Proven leadership of multi-disciplinary teams and successful ATO delivery for SAP or SCI systems
Expert knowledge of NISPOM (32 CFR 117), JSIG, RMF (NIST 800-37/-53), ICD-503, and DAAPM, oversight/execution of A&A processes.
Experience with DevSecOps pipelines, Zero Trust architecture, and Identity Access Management.
Experience executing DISA STIG/SRG hardening across Linux and Windows.
Background in network/systems security (architecture, topology, protocols, components, principles).
Hands-on with ACAS, SCAP, STIG Viewer, DISA SRGs, and SIEM/Vulnerability Tools SPLUNK, NESSUS etc.
Masters in Cybersecurity, Computer Science, or related engineering field.
CISSP-ISSEP / ISSMP or PMP.
Existing U.S. government issued Top Secret SCI (TS/SCI) security clearance within the last 24 months.
Additional Information
This is not designed to cover or contain all job duties required of the employee. There may be additional activities, duties and/or responsibilities that are required for this position that are not listed in this job description.
All employees are granted long-term stock incentives as part of their employment as Castelion. All employees receive access to comprehensive medical, vision, and dental insurance, and the company offers three weeks of paid time off per year.
Leadership Qualities
Bias to Action and Creative Problem Solving. Desire and experience questioning assumptions in ways that lead to break through ideas that are ultimately implemented. Successfully bring in applicable processes/concepts/materials from other industries to achieve efficiency gains. Ability to personally resolve minor issues in development without requiring significant support.
High Commitment, High Initiative. A successful candidate will have a genuine passion for Castelion's mission and consistently look for ways to contribute to the company's technical goals and prevent hardware blockers. Ability to work in a fast paced, autonomously driven, and demanding atmosphere. Strong sense of accountability and integrity.
Clear Communicator. Proactively communicates blockers. Trusted in previous roles to be voice of company with regulators, suppliers, gate keepers and customers. Capable of tactfully managing relationships with stakeholders to achieve company-desired outcomes without compromising relationships. Emails, IMs and verbal interactions are logical, drive clarity, and detailed enough to eliminate ambiguity.
ITAR Requirements:
· To conform to U.S. Government export regulations, applicant must be a (i) U.S. citizen or national, (ii) U.S. lawful, permanent resident (aka green card holder), (iii) Refugee under 8 U.S.C. § 1157, or (iv) Asylee under 8 U.S.C. § 1158, or be eligible to obtain the required authorizations from the U.S. Department of State.
Employment with Castelion is governed on the basis of competence and qualifications and will not be influenced in any manner by race, color, religion, gender, national origin/ethnicity, veteran status, disability status, age, sexual orientation, gender identity, marital status, mental or physical disability or any other legally protected status.
Application Security Engineer
Security architect job in Manhattan Beach, CA
WHO WE ARE:
Headquartered in Southern California, Skechers-the Comfort Technology Company -has spent over 30 years helping men, women, and kids everywhere look and feel good. Comfort innovation is at the core of everything we do, driving the development of stylish, high-quality products at a great value. From our diverse footwear collections to our expanding range of apparel and accessories, Skechers is a complete lifestyle brand.
ABOUT THE ROLE:
Skechers is seeking a passionate Application Security Engineer to join our team and serve as a security champion who bridges the gap between development and security operations. This role is critical to strengthening our security posture by embedding security practices throughout the software development lifecycle and fostering a security-first culture across our development teams.
The ideal candidate will be a hands-on security professional who thrives on collaboration, enjoys mentoring developers, and has the technical expertise to identify vulnerabilities while providing practical remediation guidance. You will play a pivotal role in scaling our application security program and ensuring our applications are secure by design.
WHAT YOU'LL DO:
Successfully integrate security practices into development workflows, resulting in measurable reduction of security vulnerabilities in production applications
Conduct thorough security-focused code reviews that identify critical vulnerabilities while providing actionable feedback to development teams
Establish and implement efficient processes for triaging, prioritizing, and tracking remediation of security findings with clear SLAs and accountability measures
Enhance developer engagement through proactive security awareness initiatives, building trusted relationships that enable developers to implement secure coding practices throughout the development process.
Assist with management and optimization of SAST, DAST, OSS, WAF, and other application security tools to maximize coverage and minimize false positives
Provide analysis and support as needed during security incidents to contribute to faster resolution times
WHAT YOU'LL BRING:
Proficiency with application security tools including SAST, DAST, dependency scanning, and WAF technologies
Strong understanding of common web application vulnerabilities (OWASP Top 10) and secure coding practices
Experience with at least one programming language (Java, Python, JavaScript, C#, or similar)
Knowledge of API security, authentication mechanisms, and authorization frameworks
Familiarity with DevSecOps practices and CI/CD pipeline integration
REQUIREMENTS:
3-5 years of hands-on application security experience with demonstrated expertise in secure code review
Retail or e-commerce experience a plus
The pay range for this position is $110,000-$155,000/yr USD.
Staff Blockchain Security Engineer
Security architect job in Irvine, CA
About the Company:
Blizzard Entertainment, a global leader in interactive entertainment, has been shaping the world of video games since its founding. Renowned for iconic franchises like
World of Warcraft
,
Overwatch
, and
Diablo
, Blizzard is dedicated to creating immersive, innovative, and high-quality gaming experiences that captivate millions of players worldwide. Our mission is to inspire and connect players through engaging gameplay, compelling storytelling, and vibrant online communities. As we continue to expand our reach in the gaming industry, we remain committed to pushing the boundaries of creativity, technology, and entertainment.
The Role: Staff Blockchain Security Engineer
Blizzard's Application Security (AppSec) team is entrusted with safeguarding the company and its players from software vulnerabilities and security threats. As a Staff Blockchain Security Engineer within AppSec, you will specialize in securing blockchain-based game features, in-game economies, and Web3 integrations. You'll collaborate closely with game development and engineering teams to provide guidance, perform security assessments, and implement best practices throughout the blockchain software lifecycle.
This role requires in-person collaboration two days per week at our Irvine, California headquarters.
Key Responsibilities:
Conduct comprehensive security reviews of blockchain integrations, smart contracts, in-game economy systems, and Web3 features for vulnerabilities and architectural flaws
Advise game development teams on secure blockchain practices and remediation strategies
Establish and maintain secure development processes within the blockchain software lifecycle
Develop, maintain, and improve blockchain-specific security tooling (e.g., fuzzers, static analysis frameworks)
Collaborate with legal, compliance, and risk teams to evaluate security, operational, and regulatory risks of blockchain implementations
Minimum Qualifications:
8+ years in application security, Web3 security, or related disciplines
Proven experience auditing smart contracts, blockchain protocols, or Web3 applications
Expertise in design reviews, threat modeling, secure code review, or penetration testing with a hacker mindset
Strong knowledge of application security principles and common vulnerabilities (e.g., SSRF, race conditions, privilege escalation)
Experience with secure key management, wallet systems, or cryptography
Familiarity with blockchain security tools such as Slither, Echidna, or similar
Scripting or programming experience in Python, C++, JavaScript, or other relevant languages
Ability to balance business goals with security priorities and communicate risks clearly to cross-functional teams
Preferred Qualifications:
Experience in formal verification of smart contracts
Background in blockchain-enabled gaming, DeFi platforms, or NFT ecosystems
Contributions to blockchain security communities, bug bounty programs, or published research
Experience defining and executing long-term blockchain security strategies alongside engineering leadership
Why Blizzard?
Competitive base salary and discretionary annual bonus
Equity opportunities and long-term incentives
Comprehensive health, dental, and vision plans
401(k) with company match
Paid parental leave and flexible time off
A hybrid work model that balances collaboration with flexibility
Salary Range: $170,000 - $250,000. This excludes discretionary bonuses or equity grants, which are determined based on experience, skills, and market standards.
Blizzard Entertainment is committed to building diverse teams that reflect the communities we serve. We are an equal opportunity employer and do not discriminate based on race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or veteran status. If you require accommodation, please reach out to our People Team.
Cyber Security Analyst
Security architect job in Irvine, CA
Required Skills & Experience:
Bachelor's degree in a related field preferred but not required.
5+ years of experience in a SOC or similar security environment.
Expertise with SIEM, EDR, CSPM tools; strong skills in SQL/KQL/Cypher for data analysis.
Proven ability to lead complex investigations and coordinate across technical and business stakeholders.
Solid understanding of cybersecurity frameworks (MITRE ATT&CK, NIST CSF, NIST SP800-61r3).
Experience with log aggregation technologies and SIEM tuning processes.
Job Description:
A large financial services customer based in Irvine, CA is seeking a Cyber Security Operations Analyst, focused on Incident Response. This individual will lead Incident Response, and act as a technical expert within the SOC. This team protects the organization from cyber threats. This role requires strong analytical skills, leadership in high-severity incidents, and deep knowledge of security tools and frameworks.
Pay:
50-65/hr
System Engineer/IT Advisor - MSP
Security architect job in La Verne, CA
📍 Base: Client base is in LA and HQ is in La Verne, CA
💰 $130 to $140K + Bonus + Benefits
We're seeking a System Engineer/ Consultative to join a growing Managed Services Provider (MSP). This role blends advanced technical expertise with consultative, client-facing responsibilities. You'll resolve high-level escalations, lead infrastructure projects, and identify opportunities to upsell solutions that truly add value for clients.
What You'll Do:
Own L3 escalations across server, cloud, and networking environments
Design and implement solutions (Azure, M365, VMware, SonicWall, etc.)
Act as a trusted advisor to clients, aligning IT with business goals
Spot upsell opportunities and work with leadership to close deals
Mentor junior engineers and help shape best practices
What We're Looking For:
4+ years MSP experience (required)
Advanced knowledge of Microsoft Server, Azure, M365, AD, VMware, and networking
Strong client-facing, consultative approach
Proven ability to upsell or expand client accounts through solutions
Perks & Benefits:
✅ Competitive salary + bonus
✅ Medical, Dental, Vision, 401(k) + 5% match
✅ PTO + Holidays
✅ Clear upward mobility and leadership growth
✅ Paid parking
Google Cloud Security Architect
Security architect job in Los Angeles, CA
Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies
As a Consultant or Senior Consultant, you will collaborate with cross-functional teams, including IT, security, and business units, to design and implement Google Cloud-based application innovation solutions. You will work alongside experienced cloud architects, data scientists, and other specialists, ensuring the successful delivery of scalable, cloud-native applications and AI-powered solutions.
What You'll Do
* Stay current with security trends, technologies, and best practices around Google Cloud solutions, leveraging tools like Cloud IAM, Cloud Security Command Center, BeyondCorp, and Cloud Armor.
* Define and guide transformational security strategies for Google Cloud environments, ensuring alignment with Google's Zero Trust and BeyondCorp principles.
* Translate complex regulatory requirements (e.g., GDPR, SOC 2, HIPAA) and technology standards into actionable functional and technical requirements for cloud and hybrid environments, ensuring security and compliance.
* Lead teams through various phases of gap analyses, including security assessments, remediation planning, roadmap development, and implementation of remediation actions using Google Cloud-native tools.
* Deliver on the vision, architecture, execution, and quality assurance of security projects on Google Cloud, driving initiatives that secure enterprise workloads and data.
* Guide stakeholders and senior leaders on aligning security solutions with broader business goals, ensuring the architecture follows Google Cloud's security best practices and roadmap.
* Establish security architecture patterns based on Google Cloud security frameworks and industry standards to meet the unique needs of enterprise clients.
* Collaborate with other Google Cloud architects and security teams to continuously improve security knowledge assets and best practices, ensuring the most effective security solutions for clients.
* Design and architect solutions to secure Generative AI models and applications against adversarial attacks, prompt injection, and their potential misuse for malicious cyber activities.
What You'll Bring
* Proven experience with Google Cloud security architecture, with hands-on experience in tools like Cloud IAM, VPC Service Controls, Cloud DLP, and Cloud Armor.
* Strong background in defining and implementing Zero Trust and BeyondCorp security models within Google Cloud environments.
* Familiarity or direct experience with Identity and Access Management (IAM), Data Protection, Vulnerability Management, and Cloud Security solutions in Google Cloud.
* Extensive experience with security design patterns specific to Google Cloud, as well as hybrid and multi-cloud security architecture.
* Experience in security and risk advisory consulting, particularly related to cloud security transformations.
* Ability to lead the development and implementation of cloud security roadmaps aligned with business goals and compliance needs.
* Familiarity with Google Cloud's Artificial Intelligence (AI) capabilities (e.g., Vertex AI, Generative AI services, Model Armor) including their applications, associated security risks (e.g., prompt injection, data poisoning, privacy concerns), and proven strategies for implementing security controls, governance, and responsible AI practices.
* Relevant certifications are strongly desired, including (but not limited to):
* GCP Professional Security Engineer
* GCP Professional Cloud Architect
* CISSP
* Security+
About Us
Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all.
Compensation and Benefits
Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance.
Slalom is committed to fair and equitable compensation practices. For this position the base salary pay ranges are listed below. In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time.
East Bay, San Francisco, Silicon Valley:
* Consultant: $120,000-$177,000
* Senior Consultant: $140,000-$203,000
San Diego, Los Angeles, Orange County, Seattle, Houston, New Jersey, New York City, Westchester, Boston, Washington DC:
* Consultant: $110,000-$162,000
* Senior Consultant: $130,000-$186,000
All other locations:
* Consultant: $105,000-$148,000
* Senior Consultant: $115,000-$171,000
EEO and Accommodations
Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process.
We are accepting applications until 12/31.
Manager, Information Security, Productions
Security architect job in Culver City, CA
The Information Security organization at Sony Pictures Entertainment is responsible for protecting our content, systems, and data from being stolen, damaged, or destroyed. To do so, we are continuously improving our tools, capabilities, and processes to stay ahead of evolving threats.
The Manager, Information Security Productions is accountable for operationalizing the Information Security Productions program across all SPE U.S. productions. This includes driving consistent implementation of approved security standards, tools, and controls; ensuring data-driven visibility into production security risk; and supporting compliance and readiness reporting to leadership. Success in this role requires strong cross-functional collaboration across Information Security, IT, S3, and production teams to embed security into creative workflows without friction, while ensuring protection of SPE's most valuable assets-our stories and intellectual property.
This role will also ensure program consistency with regional and global counterparts, contribute to automation and standardization of key controls, and support ongoing improvement of information security for productions practices across the production lifecycle.
Key indicators of success in this role will be:
+ Business leaders have near real-time visibility into production information security risk using meaningful, actionable metrics that drive timely and effective decision-making.
+ Consistent application of approved tools, workflows, and controls across productions, ensuring compliance and readiness reporting aligns with studio KPIs.
+ Production teams trust SPE to provide a secure, highly available, and easy-to-use digital production environment that safeguards our content and data.
+ Information Security, Physical Security, and IT operate as unified partners to protect SPE productions from concept to archive.
Within this organization, we value learning, agility, and collaboration. The Manager, Information Security Productions (CC, US) will be a key contributor to Sony Pictures Entertainment's goal of being the most trusted studio in the industry.
Responsibilities
Provide visibility and actionable insight into Information Security risk across active U.S. productions.
+ Monitor, analyze, and report on production security posture and key control performance metrics for each production.
+ Partner with global InfoSec, Risk, Threat Intelligence, Incident Response, Training, and Governance teams to align production needs with enterprise programs.
+ Prepare and present dashboards and reports on security trends, compliance status, and improvement opportunities.
+ Support the development of production-specific metrics and KPIs to measure control effectiveness.
+ With IT and Physical Security, maintain security controls in place for productions to most effectively meet our business goals.
Operationalize the Production Information Security Program across U.S. productions.
+ Ensure consistent implementation of approved security tools, policies, and workflows within productions.
+ Coordinate adoption of automated controls with productions, such as provisioning, watermarking, and access telemetry.
+ Support the standardization and scalability of production security practices across production titles and business units.
Ensure and track production security culture, awareness, and response readiness.
+ Amplify the reach of security training and awareness initiatives by coordinating rollout to productions, ensuring consistent messaging and participation tracking.
+ Gather feedback from productions to help refine information security for productions training and awareness efforts.
+ Partner with Incident Response to ensure clear communications, timely follow-up, and closure of corrective actions.
+ Track cultural and operational readiness indicators (e.g., onboarding rates, reporting engagement, post-incident improvements) to measure program maturity and continuous improvement.
Qualifications
+ 5+ Years of experience in Information Security, Information Technology or a related field
+ 5+ Years of experience in an organization directly involved in movie, television and/or other entertainment production, or equivalent educational experience.
+ Bachelor's degree preferred
+ Strong understanding of the technologies, tools and processes used in production of movies and/or television.
+ Knowledge of Information Security frameworks, standards and best practices and their relevance to business success
+ Specific knowledge of processes, tools and practices used to maintain confidentiality in the context of movie and television productions.
+ Ability to develop and maintain meaningful metrics to track program and process effectiveness.
+ Strong planning and analytical skills
+ Strong communications skills
Sony Pictures Entertainment is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, national origin, disability, veteran status, age, sexual orientation, gender identity, or other protected characteristics. To request an accommodation for purposes of participating in the hiring process, you may contact us at SPE_Accommodation_Assistance@spe.sony.com.
Manager, Information Security Compliance
Security architect job in Glendale, CA
Department Description
At Disney, we're storytellers. We make the impossible, possible. The Walt Disney Company (TWDC) is a world-class entertainment and technological leader. Walt's passion was to continuously envision new ways to move audiences around the world-a passion that remains our touchstone in an enterprise that stretches from theme parks, resorts and a cruise line to sports, news, movies and a variety of other businesses. Uniting each endeavor is a commitment to creating and delivering unforgettable experiences - and we're constantly looking for new ways to enhance these exciting experiences.
The Enterprise Technology mission is to deliver technological solutions that align to business strategies while enabling enterprise efficiency and promoting cross-company collaborative innovation. Our group drives competitive advantage by enhancing our consumer experiences, enabling business growth, and advancing operational excellence.
The Global Information Security (GIS) organization strives to secure the magic by employing best-in-class services to assess, prevent, detect, and respond to cyber threats that present risk to The Walt Disney Company. We enable the business by integrating enterprise and business segment-specific supported services to create a robust, efficient, and adaptable cybersecurity program. Our key objectives are to:
Secure the Magic by protecting information systems and platforms.
Reduce Risk by proactively assessing, preventing, and detecting to prevent harm to the Company and our Guests.
Strengthen the business through optimizing execution, application, and technology used to protect the Company.
Innovate by investing in core capabilities to enhance operational efficiency.
Team Description:
Global Information Security (GIS) supports all of Disney's business segments, including Disney Entertainment & ESPN (DE&E). DE&E encompasses the operations of Disney's streaming services-Disney+, Hulu, ESPN+, Disney+ Hotstar, Star, and the upcoming Venu Sports streaming service-as well as Disney's broadcast and cable networks, including ABC, ESPN, FX, Disney Channels, and National Geographic. DE&E sits at the intersection of entertainment, sports, and technology, striving to connect viewers with beloved stories while advancing the streaming industry with consumer-first innovations. Security professionals supporting DE&E work with industry-leading technologies to deliver world-class, highly secure services to customers.
What You'll Do:
Independent audit support for:
SOX 404 ITGCs
PII
PCI
ISPS
Collaborate with Enterprise Controls and Compliance (ECC) to scope systems and respective ITGCs.
Perform control health checks and remediation testing procedures to address issues identified via audit assessments, access control reviews, internal or external audits and/or other assessments.
Develop and lead the Control Assurance Programs (ISPS and SOX).
Lead Audit Readiness efforts to ensure proper system scoping and respective ITGCs, control validations and timely program onboarding.
Participate in audit walkthrough meetings to help establish internal testing procedures to gain operational comfort in the design of the Company's automated controls.
This includes control self-evaluations of new controls or processes that impact the effectiveness of an existing control.
Perform impact analysis and risk assessment on deficiency findings and documentation associated with the assessment.
Work with management and internal audit on maintaining the master Risk and Control Matrix over the systems material to Disney Entertainment and ESPN (Broadcast TV and Streaming - Hulu, Disney+, ESPN+, STAR+ products)
Ensure for timely management response of audit findings into our corporate SOCD/SAD.
Oversee ISPS Management Audit coordination and open action plans.
Provide consultancy to Development leads to identify and implement automation and efficiency opportunities to meet governance and compliance demands.
Management of GRC workflows around coordination of certifications and attestations.
Partner with leadership to support the PCI-DSS compliance program.
Develop training materials, coordinate training sessions, and monitor compliance with training requirements.
Oversee and manage a team of compliance analysts, ensuring day-to-day operations run smoothly and efficiently.
Assign tasks and projects to team members based on priorities, deadlines, and individual strengths.
Provide executive level updates on Compliance programs
Must Haves (Years of Experience, languages, programs, tools, etc.):
Minimum of 8 years of related work experience, with 3 in management roles
IT SOX experience and proven experience in supporting IT audit/compliance functions
Experience in managing people
Thorough understanding of SOX ITGC and ICFR 404 standards and audit objectives
Interpersonal skills with the ability to work with teams cross-functionally
Strong verbal and written communication skills and ability to effectively communicate to technical and non-technical audiences, including developers and tech operators
Detail-oriented but able to understand the big picture. Highly organized and efficient
Ability to navigate through ambiguity, manage and coordinate multiple project assignments simultaneously in a fast-paced, deadline-driven environment, accepting ownership and accountability of the process and deliver on commitments
Experience with cloud-based services, specifically AWS
Nice To Haves (see above):
Experience and knowledge of NIST framework, ISO 27001, K-ISMS, GDPR
Experience working with companies that have a heavy microservice architecture
Education:
Bachelor's degree in Computer Science, CPA license, Information Systems, Software, Electrical or Electronics Engineering, or comparable field of study, and/or equivalent work experience
The hiring range for this position in Glendale, CA and Santa Monica, CA is $141,900 to $190,300 per year and in New York, NY is $148,700 to $199,400 per year. The base pay actually offered will take into account internal equity and also may vary depending on the candidate's geographic region, job-related knowledge, skills, and experience among other factors. A bonus and/or long-term incentive units may be provided as part of the compensation package, in addition to the full range of medical, financial, and/or other benefits, dependent on the level and position offered.
Job Posting Segment:
Enterprise Technology
Job Posting Primary Business:
Corporate Global Information Security
Primary Job Posting Category:
Security Governance
Employment Type:
Full time
Primary City, State, Region, Postal Code:
Glendale, CA, USA
Alternate City, State, Region, Postal Code:
USA - CA - 2450 Broadway, USA - NY - 7 Hudson Square
Date Posted:
2025-11-21
Auto-ApplyDirector, Information Security
Security architect job in Aliso Viejo, CA
Are you a hands-on security leader ready to make a measurable impact in a mission-driven organization? We're looking for a Director of Information Security to lead and scale our security operations, incident response, and engineering efforts. In this role, you'll oversee our security ecosystem - from real-time monitoring to proactive threat hunting - and help shape the future of enterprise security at a growing company.
This is a highly collaborative position where you'll work cross-functionally with teams across the business to protect our information assets, infrastructure, and services - especially within a SaaS and life sciences environment.
What will you do?
Shape and drive the enterprise security operations strategy in alignment with broader company goals.
Serve as a trusted advisor to senior leadership on all things security.
Manage our Security Operations Center (SOC), ensuring rapid incident detection, triage, and response.
Oversee threat intelligence, vulnerability management, and operational risk mitigation initiatives.
Partner with IT and engineering teams to deploy, tune, and optimize tools like SIEM, SOAR, EDR, and DLP.
Implement automation and integrations that improve speed and efficiency.
Lead cyber incident response efforts and continuously test and improve our disaster recovery and response plans.
Coordinate cross-functional teams (e.g., Legal, HR, Communications) during major security events.
Lead, mentor, and grow a high-performing team of security and infrastructure professionals.
Support the development of a resilient, inclusive, and learning-driven culture across the department.
Align programs with regulatory standards (HIPAA, SOX, GDPR, PCI-DSS) and frameworks (NIST, MITRE ATT&CK).
Support audits and ensure documentation is ready and accurate.
How will you get there?
Bachelor's degree in Computer Science, Information Security, or related field (Master's a plus).
12+ years of relevant experience, including 4+ years leading teams in complex enterprise environments.
Hands-on expertise in SOC management, incident response, and threat intelligence.
Experience in the Medical Device, Life Sciences, or highly regulated industries preferred.
Professional certifications such as CISSP, CISM, GIAC, or CEH.
Proficiency with security tools including SIEM, EDR, SOAR, IDS/IPS, and vulnerability management platforms.
Strong knowledge of cloud (AWS, Azure, GCP), Windows/Linux systems, and network protocols.
Familiarity with security frameworks and standards (NIST, MITRE, ISO 27001).
Proven ability to build, lead, and retain high-performing technical teams.
A proactive, solutions-oriented mindset with excellent communication and collaboration skills.
#GKOSUS
Auto-ApplySr. Security Compliance Analyst
Security architect job in Irvine, CA
Job Description
Headquartered in the United States, TP-Link Systems Inc. is a leading global provider of networking devices and smart home products. Consistently ranked as the world's top provider of Wi-Fi devices, TP-Link is dedicated to delivering innovative solutions that improve people's lives by offering faster, more reliable connectivity. Serving customers in over 170 countries, we are committed to expanding our global footprint.
At TP-Link Systems Inc., we believe that technology has the power to transform the world for the better. Our mission is to design reliable, high-performance products that connect users worldwide to the limitless possibilities of technology.
We are driven by our core values of professionalism, innovation, excellence, and simplicity. Our goal is to help clients achieve outstanding global performance and to provide consumers with a seamless, effortless technology experience.
TP-Link Systems Inc. is seeking a skilled and proactive Sr. Security Compliance Analyst who will be responsible for developing and overseeing TP-Link's enterprise security governance framework, ensuring compliance with regulatory requirements, industry standards, and internal policies. This individual will collaborate with cross-functional teams to embed security into business operations, manage risk, and enhance security resilience across TP-Link's enterprise ecosystem.
Key Responsibilities:
Security Governance & Policy Development
Develop, implement, and maintain security policies, standards, and guidelines aligned with industry best practices (e.g., NIST, ISO 27001, CIS).
Establish and lead a security governance framework to ensure consistent application of security controls across the enterprise.
Risk Management & Compliance
Identify, assess, and mitigate security risks across TP-Link's global operations.
Ensure compliance with regulatory requirements such as GDPR, CCPA, NIST CSF, and other applicable cybersecurity frameworks.
Oversee security audits, risk assessments, and third-party security evaluations.
Partner with legal, IT, and business leaders to address security compliance gaps.
Third-Party & Supply Chain Security
Develop and enforce security requirements for vendors, suppliers, and third-party partners.
Conduct security assessments of supply chain partners to identify and mitigate potential risks.
Security Awareness & Training
Develop and lead security awareness programs to educate employees on cybersecurity risks and best practices.
Foster a security-first culture across all levels of the organization.
Provide guidance and training on security governance processes for internal stakeholders.
Incident Response & Continuous Improvement
Support security incident response efforts by ensuring governance processes facilitate rapid detection and response.
Lead post-incident analysis to refine security policies and controls.
Monitor emerging threats, regulatory changes, and industry trends to evolve TP-Link's security governance strategies.
Requirements
Qualifications Education:
Bachelor's degree in Computer Science, Cybersecurity, Information Security, or a related field.
Experience:
5+ years of experience in security governance, risk management, or compliance in a global technology or networking company.
Proven track record in developing and implementing security governance frameworks for enterprise security.
Experience managing compliance with industry standards and regulations (ISO 27001, NIST CSF, SOC 2, GDPR, CCPA, etc.).
Hands-on experience with supply chain security, third-party risk management, and vendor security assessments.
Skills:
Deep understanding of security frameworks (ISO 27001, NIST, CIS, SOC 2) and regulatory requirements.
Strong expertise in risk management methodologies, security policy development, and compliance auditing.
Proficient in conducting security assessments, third-party risk evaluations, and internal security reviews.
Ability to communicate complex security concepts to business and technical stakeholders effectively.
Strong leadership skills with experience in cross-functional collaboration and executive reporting.
Benefits
Salary range: $100,000-$150,000
Free snacks and drinks, and provided lunch on Fridays
Fully paid medical, dental, and vision insurance (partial coverage for dependents)
Contributions to 401k funds
Bi-annual reviews, and annual pay increases
Health and wellness benefits, including free gym membership
Quarterly team-building events
At TP-Link Systems Inc., we are continually searching for ambitious individuals who are passionate about their work. We believe that diversity fuels innovation, collaboration, and drives our entrepreneurial spirit. As a global company, we highly value diverse perspectives and are committed to cultivating an environment where all voices are heard, respected, and valued. We are dedicated to providing equal employment opportunities to all employees and applicants, and we prohibit discrimination and harassment of any kind based on race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Beyond compliance, we strive to create a supportive and growth-oriented workplace for everyone. If you share our passion and connection to this mission, we welcome you to apply and join us in building a vibrant and inclusive team at TP-Link Systems Inc.
Please, no third-party agency inquiries, and we are unable to offer visa sponsorships at this time.
Director, Information Security & Compliance
Security architect job in Los Angeles, CA
Loyola Marymount University (LMU) is seeking an experienced leader to serve as Director of Information Security & Compliance within our Information Technology Services (ITS) team. This role offers a strategic opportunity to shape and safeguard the university's digital environment, drive proactive risk management, and embed a culture of security across the organization. Reporting directly to the CIO/VP of IT, the Director will architect and manage a best-in-class information security and compliance program that supports LMU's mission of learning, holistic education, service, and justice.
Under the general direction of the CIO/Vice President for Information Technology, the Director of Information Security and Compliance will serve as the University's Cybersecurity leader. The Director will create a modern and effective Information Security and Compliance Program that will drive the university's efforts to protect its information assets and ensure compliance with relevant regulations and standards. This role is pivotal in creating a secure and compliant digital environment that supports LMU's mission, values, and goals. The Director will leverage partnerships and collaboration to lead initiatives that result in measurable improvements in information security and compliance, fostering a culture of security awareness and proactive risk management. The Director will serve as the process owner of the appropriate second-line assurance activities not only related to confidentiality, integrity and availability, but also to the safety, privacy and recovery of information owned or processed by LMU in compliance with regulatory and university requirements. The Director will oversee the university's compliance with applicable laws, regulations, and policies related to information security and privacy.
Position Specific Responsibilities/Accountabilities
* Enhance Security Posture: Develop and implement a comprehensive cybersecurity program that significantly reduces risks and vulnerabilities across the university's digital landscape.
* Ensure Regulatory Compliance: Achieve and maintain compliance with relevant regulations and standards, ensuring that LMU meets all legal and regulatory requirements.
* Collaborative Protection: Work closely with various campus partners, external stakeholders, and community partners to ensure that information assets and associated technologies are protected, resulting in a cohesive, unified, and well understood approach to information security and compliance.
* Risk Management: Conduct thorough risk assessments and implement effective mitigation strategies, leading to a demonstrable reduction in potential threats.
* Incident Response: Oversee and improve incident response and recovery efforts, ensuring swift and effective investigation and resolution of security incidents.
* Policy Development: Create and enforce robust policies and procedures that safeguard information assets, leading to a well-documented and easily accessible framework for cybersecurity.
* Training and Awareness: Provide comprehensive training and guidance to staff on cybersecurity best practices, resulting in a well-informed and vigilant workforce.
* Monitoring and Reporting: Continuously monitor and report on the effectiveness of the cybersecurity program, providing clear metrics and insights that demonstrate progress and areas for improvement.
* Leadership and Strategy: Plan and manage the strategy, people, processes, tools, services, and resources necessary to effectively support the program and meet strategic goals.
* Business Continuity and Disaster Recovery: Orchestrate a secure, robust, and highly reliable approach to providing ITS services, during and after a disaster or disruption, to minimize negative impacts to business operations and maintain essential services.
* Data Governance: Oversee the university's data governance efforts, ensuring that data is managed securely and in compliance with university policies and legal requirements.
* Perform other related duties.
Loyola Marymount University Expectations
Exhibit behavior that supports the mission, vision, and values of the university. Communicate and employ interpersonal actions that model high standards of professional, responsible, accountable, and ethical conduct. Demonstrate a commitment to outstanding customer service.
Requisite Qualifications
* Typically a Bachelor's Degree from an accredited four-year institution in Computer Science, Information Technology, or Cybersecurity.
* Seven years of experience in information security, with at least three years in a management role.
* Experience in developing and implementing technology policy, especially in a University environment is desirable.
* Professional certifications such as CISSP, CISM, or CISA are highly desirable.
* Experience in developing and implementing technology policy, preferably in a University environment.\
* Strong knowledge of frameworks, standards, and best practices relating to Information Security, Privacy, Data Governance, and Business Continuity and Disaster Recovery Experience with regulatory compliance requirements (e.g., i.e. FERPA, HIPAA, GDPR, CCPA, and PCI-DSS).
* Demonstrated excellent verbal and written communication skills, as well as presentation skills. Writing samples may be required.
* Excellent analytical, problem-solving, and decision-making skills.
* Strong communication and interpersonal skills, with the ability to effectively collaborate with diverse stakeholders.
* Demonstrated ability to lead and manage a team of security professionals.
The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities, duties and skills required of this position.
#HERC# #HEJ#
Staff Regular
Salary range
$146,800.00 - $205,500.00 Salary commensurate with education and experience.
Please note that this position is not eligible for visa sponsorship now or in the future.
Loyola Marymount University, a Carnegie classified R2 institution in the mainstream of American Catholic higher education, seeks outstanding applicants who value its mission and share its commitment to inclusive excellence, the education of the whole person, and the building of a just society. LMU is an equal opportunity employer committed to providing an environment free from discrimination and harassment as defined by federal, state and local law. We invite all persons in the full diversity of their being, life experience, and beliefs to apply. (Visit *********** for more information.)
Auto-ApplySystems Security Engineer II
Security architect job in Huntington Beach, CA
The System Security Engineer Level II is required to be a highly skilled and hands-on security engineer, and will be responsible for helping to maintain and expand the infrastructure of the entire Cambro network, ensuring that they are protected from cyber threats and attacks, ensuring compliance, and responding to incidents. In this role, the responsibility is to manage, monitor, and maintain our Network IT infrastructure from CVEs, cyber threats, manage and implement device firmware and software updates. Also, the role is required to assist in projects and initiatives to support, upgrade, and maintain our technical environment to improve network security. The role requirement is to be proficient with cybersecurity frameworks including NIS, ISO27001/27002, CIS, HIPAA, CCPA/CPRA and GDPR. The role requires to have a multi-disciplined background including experience with Cybersecurity Operations, firewalls, IDS/IPS, switches, VLANs, routing protocols, IPsec, VPN tunnels, multi factor authentication and e-mail security. In addition, they must have a solid understanding of virtualized servers, Windows workstations and services. This role is required to have the network monitoring skills and technologies for detecting unusual activity, investigate security breaches and lead incidence response.
ESSENTIAL JOB FUNCTIONS
• Monitor network traffic for anomalies, investigate alerts and respond to security incidents.
• Conduct regular vulnerability scans, risk assessments, patch management and mitigation across network devices.
• Ensure adherence to cybersecurity frameworks including NIS, ISO27001/27002, CIS, HIPAA, CCPA/CPRA and GDPR.
• Able to proactively scan servers and network devices for vulnerable ports and protocols and rogue devices.
• Manage our firewall environment with the ability to create route policies and apply cybersecurity recommendations
• Install and configure Network Equipment (Switches, Firewalls, and other networking hardware)
• Perform (Layer 2) switch administration and configuration on Cisco/Ruckus switches. Including configuring LAGs, interfaces, creating trunks, creating, and managing segmented VLANs.
• Possess a solid understanding of Windows Server services and roles including installation and configuration
• Create certificates for network devices and servers that have a web management capability
• A strong understanding of Windows Active Directory and can design, implement, and configure and troubleshoot Active Directory issues
• Create, Manage and Deploy Group Policy Objects (GPO's) to deploy applications and implement security including windows firewalls
• Effectively use PowerShell to automate and standardize administrative tasks
• Capable of installing a Linux VM and execute basic Linux commands and managing Linux appliances
• Manage our virtualized server environment managing, creating VM's and patching the VMware environment.
• Strong understanding of Virtual Switches, Port Groups (Distributed and Standard)
• Manage the Active Backup for Business on Synology and other advanced Synology administration features
• Maintain and monitor Backup solutions.
• Manage our users email accounts using the cloud service M365 from Microsoft
• Responsible for creating and maintaining server and network documentation to include tasks and procedures
• Proactively monitor our network using a variety of tools to help identify potential network and server issues
• Assist in patching our entire infrastructure when needed using a variety of tools
• Maintains strong technical abilities, knowledge of new and changing technologies
• Prepare for emergencies by creating and/or updating action plans
• Jumping into time-sensitive projects wherever needed
• Showing flexibility and a willingness to learn
• Maintain healthy communication with IT Staff, IT Customers and Vendors
• Actively participate in IT Infrastructure and Operations projects, managing, completing, communicating, and fully documenting assigned tasks and deliverables.
• Maintain reliable and consistent attendance, including being punctual, and dependable in order to meet the needs of the department and the organization.
• Execute each essential duty satisfactorily to perform job successfully.
• Follows all safety procedures required in work area, wears PPE as needed, attends all safety meetings, and reports safety issues regarding equipment or unsafe/hazardous conditions.
• Performs effectively as a team member, able to work well with others, open to receiving and give feedback, and treats everyone with respect.
• Takes ownership of own work and behavior, accepts accountability for own actions, encourages solutions, and communicates status of work/projects.
• Follow all department quality standards/criteria. Raise concerns and issues to immediate manager.
• Able to understand and demonstrate Cambro company culture, display company core values (Safety, Quality, Respect, and Service).
• Understands department's key performance indicators and contributes to achieve these goals both individually and as a team.
• Maintains reliable and consistent attendance, including being punctual, dependable, and flexible to potential schedule changes to meet the needs of the department and the organization.
• Executes each essential duty satisfactorily to perform job successfully.
• Follows all safety procedures required in work area, wears PPE as needed, attends all safety meetings, and reports safety issues regarding equipment or unsafe/hazardous conditions.
• Performs effectively as a team member, able to work well with others, open to receive and give feedback, and treats everyone with respect.
• Takes ownership of own work and behavior, accepts accountability for own actions, encourages solutions, and communicates status of work/projects.
• Follows all department quality standards/criteria. Raises concerns and issues to management.
• Understands department's key performance indicators (KPIs) and contributes to achieve these goals both individually and as a team.
• Other duties as needed or required.
ADDITIONAL RESPONSIBILITIES
• Ability to be on call 24 hours a day, 7 days a week for global operations, by periodically providing off-hours, evening, and weekend support to accommodate maintenance windows and issue resolution
• Occasional travel to various Cambro locations domestically and internationally as required (15%)
• May occasionally guide less experienced associates to help with technical projects
• Some travel may be required.
REQUIRED QUALIFICATIONS
The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
• Bachelor's degree (B.A.) from a four-year accredited college or university.
• 5-10 years of experience in IT security, network, administration, and support roles.
• Ability to interpret a variety of instructions furnished in written, oral, diagram, or schedule form.
• Ability to adapt and adjust plans to meet changing needs.
• Proficient in Microsoft Office Suite
• Experience with Fortinet solutions, EDR, email security solutions
• Solid knowledge of cybersecurity frameworks including NIS, ISO27001/27002, CIS, HIPAA, CCPA/CPRA and GDPR.
• Solid working knowledge of Layer 2 (VLANs, Inter-VLANs, VTP Domains, bridge groups, MVRP, ACL's) technologies and network segmentation.
• Strong knowledge of DNS records including reverse zones and maintaining DNS records
• Strong DHCP Knowledge to include DHCP Fail over and able to configure DCHP relay on Switches
• Solid understanding of routing protocols, static routes and ARP cache
• Proficient in creating and implementing certificates on layer 2 devices (Switches, Firewalls, Linux Appliances)
• Strong troubleshooting skills and possess the ability to find security and network issues in a timely manner
• Strong Windows administration skills including Active Directory/GPO's and security policies
• Solid working knowledge of Virtualization, such as VMware ESXi servers and vCenter 7.x
• Solid working knowledge of Veeam/Bacula/Exagrid backup software to manage backup and restore procedures
• Must be able to follow instructions and procedures and ask questions if something is unclear
• Excellent documentation skills including ability to create network drawings
• Self-motivated and energetic with the ability to manage time efficiently without supervision and to work effectively under pressure
• Strong customer service and communication skills
• Excellent organizational skills and strong sense of urgency
• Familiarity with various network types including LANs, WANs, SDWAN, WLANs, SANs, and VoIP networks
• Great accuracy and attention to detail
PREFERRED QUALIFICATIONS
• Experience in Business Continuity and disaster recovery is a plus
• Knowledge of Ruckus Access Points and Switches
• Knowledge of IBMi
PHYSICAL DEMANDS
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Sitting, walking, standing, bending at the neck, bending at the waist, squatting, climbing, kneeling, crawling, twisting at the neck and waist, repetitive use of hands, simple grasping, power grasping, fine manipulation, pushing and pulling, reaching above and below the shoulder, carrying/lifting up to 50 lbs.
Driving cars and other IT equipment
Working around equipment and machinery
Exposure to excessive noise
Exposure to dust, gas, fumes or chemicals
Working at heights
Use of special visual or auditory protective equipment
Walking on uneven ground
PPE Requirements
Safety glasses
Steel-toe slip-resistant shoes - When in production area
Hearing protection (e.g. ear plugs, ear muffs) - When in production area
Face covering (mask) in accordance with company policy.
Hardhat/bump camp
IT Application
COMPENSATION RANGE:
$97,000- $120,000
Salary may vary based on experience.
CAMBRO is proud to be an equal-opportunity workplace. All qualified applicants will receive consideration for employment without regard to and will not be discriminated against based upon race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic information, military or veteran status, or other characteristics protected by law.
Auto-ApplySenior Security Architect
Security architect job in Orange, CA
Security, Compliance and Audit Readiness:
Enforce network security controls aligned with Criminal Justice Information Services (“CJIS”), National Institute of Standards and Technology (“NIST”), and department policy.
Implement and maintain firewall rulesets, Network Access Control (“NAC”) solutions (e.g., Cisco Identity Service Engine (“ISE”)), and endpoint access policies.
Support the cybersecurity team in incident detection, forensic analysis, and mitigation strategies.
Provide documentation and evidence for security audits and compliance reviews.
Implementation, Operations and Support:
Serve as the hands-on engineer for network deployment, upgrades, and incident response.
Configure and manage Cisco switches, routers, firewalls, WLCs, and wireless endpoints.
Design and manage VPNs, QoS, ACLs, network monitoring, and logging systems (SolarWinds, NetFlow, SNMP).
SME Leadership and Staff Development:
Serve as the department's SME on enterprise security, guiding decisions across IT, public safety systems, and operations.
Train, coach, and mentor internal IT staff, including junior and mid-level network technicians.
Lead structured knowledge transfer sessions, hands-on training, and real-time coaching during support and implementation activities.
Create SOPs, how-to guides, and step-by-step documentation tailored for ongoing use by internal staff.
Support staff in preparation for certification paths (e.g., CCNA/CCNP) if desired.
Any other activities reasonably related to the foregoing, as assigned by the Client