Cyber Security Analyst
Security engineer job in Irvine, CA
Required Skills & Experience:
Bachelor's degree in a related field preferred but not required.
5+ years of experience in a SOC or similar security environment.
Expertise with SIEM, EDR, CSPM tools; strong skills in SQL/KQL/Cypher for data analysis.
Proven ability to lead complex investigations and coordinate across technical and business stakeholders.
Solid understanding of cybersecurity frameworks (MITRE ATT&CK, NIST CSF, NIST SP800-61r3).
Experience with log aggregation technologies and SIEM tuning processes.
Job Description:
A large financial services customer based in Irvine, CA is seeking a Cyber Security Operations Analyst, focused on Incident Response. This individual will lead Incident Response, and act as a technical expert within the SOC. This team protects the organization from cyber threats. This role requires strong analytical skills, leadership in high-severity incidents, and deep knowledge of security tools and frameworks.
Pay:
50-65/hr
Network Security Engineer
Security engineer job in San Diego, CA
Role: Network Security Engineer
Duration: Contract
Look for strong Palo Alto and Infoblox experience
Who had worked on deployment of Palo Alto and Infoblox
Key skills: Panorama, Expedition, Infoblox, palo alto, Prisma excess
Senior Security Engineer We seek to hire a Firewall Security Engineer that will be responsible for maintaining firewalls, supporting computer network defense, to include auditing the network for vulnerabilities, identifying relevant threats, recommending corrective actions, developing solutions for security issues, and investigating security incidents and breaches. Also manage and maintain the network security systems.
Responsibilities
Firewall management (e.g. DMZ, Internet, Third Party connections), specifically for Next Generation Firewalls
Maintenance of IPAM
Maintenance of remote access tools
Support enterprise incidents
Researches emerging threats and vulnerabilities to aid in the identification of network incidents
Analyzes data from threat and vulnerability feeds and analyzes data for applicability to the client's organization
Ensures compliance with all applicable configuration standards
Recommends security controls and/or corrective actions for mitigating technical and business risk
Produces vulnerability, configuration, and coverage metrics and reporting to demonstrate assessment coverage and remediation effectiveness
Provision and management of multi-factor authentication (e.g., token, certificate)
Malicious code detection and prevention, and Internet monitoring (e.g. IDS/IPS)
Security policy verification
Tiered web filtering (e.g., URL filtering, malicious sites, spyware, advertisements, instant messaging, free software downloads)
Internet usage reporting
Provision, installation, configuration, management, and maintenance of network intrusion detection and prevention sensors at specified network entry points
Intrusion Incident reporting
Ongoing vulnerability assessment and remediation activities
Support of Third Party security assessment, scanning and penetration testing
Design, implementation, management and maintenance of encryption solutions
Management of Client-owned security certificates, SSLs and domain names; where applicable
Logging, tracking and management of security risks and issues to Resolution and closure
Network security Services reporting per Client requirements
Remediation of discovered security risks from any security audit findings
Qualifications
BS in Computer Science, Information Security, or a related field is highly desirable
7+ years of work experience in information security, especially in a network security Engineer role
Preferred Certification - CSA+, CISSP, GIAC, PCNSA, PCNSE, PCDRA
Competencies Required
Experience with NGFW, specifically with Palo Alto and Panorama
Experience managing Infoblox
Technical expertise in analyzing threat event data, evaluating malicious activity, documenting unusual files and data, and identifying tactics, techniques and procedures used by attackers
Technical expertise in system security vulnerabilities and remediation techniques, network and web-related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, etc.)
Technical and troubleshooting expertise in security engineering, system and network security, authentication and security protocols
Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one
An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business
An understanding of organizational mission, values, and goals and consistent application of this knowledge
ISO 2700 Awareness
Aerospace System Engineer II
Security engineer job in Irvine, CA
L·Garde is a full-service design, development, manufacturing, and qual test supplier to Tier 1 primes and government agencies. We provide systems engineering and skilled technicians to make your make your Skunk Works-type project a reality. With over 50 years of aerospace expertise, our deployable systems test the limits of what's possible in the harshest of environments in space, on the moon, and even on other planets.
If you're an engineer who thrives on teamwork, clear communication, and seeing your work translate into cutting-edge aerospace solutions, we'd love to talk to you.
A Day in the Life:
We're looking for a Systems Engineer who is passionate about solving complex challenges in aerospace and enjoys working closely with others to make big ideas a reality. In this role, you'll help transform mission requirements into fully engineered space systems, balancing technical performance, schedule, and cost. You'll collaborate across disciplines-design, test, integration, and program management-to ensure our spacecraft and payload systems meet the highest standards of innovation and reliability.
Key Responsibilities:
Lead systems engineering activities across the project lifecycle, from concept through delivery.
Develop and maintain system requirements, CONOPS, ICDs, and risk matrices.
Support Verification & Validation (V&V) efforts and create and maintain Model Based Systems Engineering (MBSE) models.
Partner with engineers, technicians, suppliers, and customers to resolve issues and ensure requirements are met.
Write and review test plans, procedures, and reports; analyze and post-process test data.
Contribute to design trade studies and product development planning.
Participate in major design reviews (SRR, PDR, CDR, TRR) and customer meetings.
Support proposal writing for advanced aerospace concepts.
Maintain a safe, clean, and organized work area by following 5S and safety guidelines.
Who You Are:
You have a Bachelor's degree in engineering, science, or related technical field.
2-4 years of satellite systems engineering experience with DoD, NASA, or commercial space programs.
At least 2 years in management, project leadership, or team leadership roles.
Proficiency with requirements tracking and management.
Proficiency with Model Based Systems Engineering and requirements tracking tools such as CAMEO and DOORS is a plus. Systems Engineers will be expected to have completed training for these tools within the 1st year.
Hands-on experience with hardware/software interfaces, aerospace drawings, and GD&T standards.
Exposure to SolidWorks CAD, FEA, Matlab, Thermal Desktop, CFD (Star CCM+), or LabView preferred
The ability to obtain a U.S. Security Clearance for which the U.S. Government requires U.S. Citizenship.
Top Secret Security Clearance a plus.
Excellent written and verbal communication skills.
Strong interpersonal skills with the ability to collaborate across all levels of the organization.
Detail-oriented, organized, and adaptable in a fast-paced environment.
Strong problem-solving mindset and passion for working in a team-driven culture.
What We Offer:
Be at the forefront of aerospace innovation by working on cutting-edge aerospace technologies.
Opportunity to wear multiple hats and grow your skill set.
Collaborative and inclusive work culture where your contributions are highly valued.
Competitive salary
Top-Tiered Benefits, 100% of both employee and dependents are covered by the company = Medical, Dental, Vision
Flexible Spending Account
Retirement and Company Match
Company-Sponsored Life and LTD Insurance
Generous Paid Time Off Policy with up to 4 weeks in the first year.
Robust Paid Holiday Schedule
Pay range: $110,000.00 - $145,000.00 per year
Join our team as an Aerospace Systems Engineer II and contribute to the advancement of aerospace innovation by taking on diverse, impactful projects in a collaborative environment, where your contributions are valued and your growth is fostered through hands-on experience.
L·Garde is an equal opportunity employer, including individuals with disabilities and veterans, and participates in the E-Verify Program.
System Engineer (Managed Service Provider)
Security engineer job in Costa Mesa, CA
We are a long established Southern California Managed Service Provider supporting SMB clients across Los Angeles and Orange County with proactive IT, cybersecurity, cloud solutions, and hands on guidance. Our team is known for strong client relationships and clear communication, and we take a steady, service first approach to solving problems the right way.
We are hiring a Tier 3 Systems Engineer to be the L3 escalation point and technical backstop for complex issues across diverse client environments. This role requires previous MSP experience and is ideal for someone who enjoys deep troubleshooting, ownership, and helping reduce repeat issues by getting to root cause. Expect about 75 percent escalations and 25 percent project work tied to recurring client needs.
What You Will Do
• Own Tier 3 escalations across servers, networking, virtualization, and Microsoft 365
• Troubleshoot deeply and drive root cause fixes
• Handle SonicWall, VLAN, NAT, and site to site VPN work
• Support Windows Server AD, GPO, DNS, DHCP
• Support VMware ESXi vSphere and Hyper V
• Lead Microsoft 365 escalations and hardening
• Document clearly and communicate client ready updates
What You Bring
• 5 plus years MSP experience supporting multiple client environments
• Strong troubleshooting and escalation ownership
• SonicWall plus strong VLAN and VPN skills
• Windows Server 2012 to 2022
• VMware and or Hyper V
• Microsoft 365 plus Intune fundamentals
• Azure and Entra ID security configuration
• ConnectWise Command and ConnectWise Manage preferred
Location, Pay, and Benefits
• $95,000 to $105,000 DOE
• Hybrid after onboarding
• Medical, dental, vision
• 401k with 3% company match
• PTO and sick time plus paid holidays
• Mileage reimbursement
Staff Product Security Engineer (SSDL)
Security engineer job in San Diego, CA
It all started in sunny San Diego, California in 2004 when a visionary engineer, Fred Luddy, saw the potential to transform how we work. Fast forward to today - ServiceNow stands as a global market leader, bringing innovative AI-enhanced technology to over 8,100 customers, including 85% of the Fortune 500 . Our intelligent cloud-based platform seamlessly connects people, systems, and processes to empower organizations to find smarter, faster, and better ways to work. But this is just the beginning of our journey. Join us as we pursue our purpose to make the world work better for everyone.
Job Description
**PLEASE NOTE**: This role requires a minimum of 2 days per week in our San Diego, CA ServiceNow Office. Please do not apply if you cannot meet this requirement. Thank you
The ServiceNow Security Organization (SSO):
The ServiceNow Security Organization (SSO) delivers world-class, innovative security solutions to reduce risk and protect the company and our customers. We enable our customers to migrate their most sensitive data and workloads to the cloud, accelerating our business so that we are the most trusted SaaS provider. We create an environment where our employees are proud to work and can make a positive impact
Team:
Product Security is Shifting Everywhere and holistically improving the maturity of the security program. The Secure Software Development Lifecycle (SSDL) team helps the organization measure and improve security activities. The team leads product threat modeling, helps to improve security behaviors, and manages a highly visible security champions program. The team is both highly technical and strategic.
Role:
As a Staff Product Security Engineer on the ServiceNow SSDL team, you will collaborate with developers and software architects on highly technical solutions and help the organization build secure and resilient software. You will be threat modeling software products and services to identify potential risk and participate in architectural reviews of products in development.
A key part of this position is to ensure the continued success of a large and growing security champions program. You will help mentor security champions and assist them in secure software design. As a Staff Product Security Engineer, you will help security champions be successful.
What you get to do in this role:
Work on a wide range of technologies
Work on complex architectural and technical challenges
Participate in threat modeling activities
Mentor and collaborate with development teams to adopt secure coding practices
Work on strategic and highly visible security activities across the organization
Be an advocate for security and participate in a security champions program
Qualifications
To be successful in this role, we need someone who has:
Experience in leveraging or critically thinking about how to integrate AI into work processes, decision-making, or problem-solving. This may include using AI-powered tools, automating workflows, analyzing AI-driven insights, or exploring AI's potential impact on the function or industry.
2+ years of experience in software development
8+ years of experience in software security (AppSec)
2+ years of experience in threat modeling software applications and services
Proficient in threat modeling methodologies such as STRIDE or PASTA and their applied use in fast-moving, iterative development lifecycles
In-depth knowledge of common web application vulnerabilities (OWASP Top 10)
Developer-level proficiency in one or more languages - Python, Java, JavaScript, and Golang preferred
Working knowledge of Machine Learning and taxonomies such as BIML that categorize known attacks on machine learning models
In-depth knowledge of software design patterns and their security considerations
In-depth knowledge of authentication and authorization standards including OAuth, OIDC, SAML, JWT, and PASETO
Knowledge of symmetric and asymmetric cryptography, digital signatures, PKI, TLS, and cryptographic hash functions
Knowledge of cloud native technologies including containers, Kubernetes, and services provided by AWS, GCP, and Azure
Knowledge of static analysis (SAST), dynamic analysis (DAST), and software composition analysis (SCA) security tools
Knowledge of OWASP ASVS, SCVS, and related verification standards
Ability to work collaboratively in a highly distributed team
Ability to communicate technical concepts to business stakeholders
A passion for security
#SecurityJobs
For positions in this location, we offer a base pay of: $155,800 to $272,700 plus equity (when applicable), variable/incentive compensation and benefits. Sales positions generally offer a competitive On Target Earnings (OTE) incentive compensation structure. Please note that the base pay shown is a guideline, and individual total compensation will vary based on factors such as qualifications, skill level, competencies, and work location. We also offer health plans, including flexible spending accounts, a 401(k) Plan with company match, ESPP, matching donations, a flexible time away plan and family leave programs. Compensation is based on the geographic location in which the role is located and is subject to change based on work location.
Additional Information
Work Personas
We approach our distributed world of work with flexibility and trust. Work personas (flexible, remote, or required in office) are categories that are assigned to ServiceNow employees depending on the nature of their work and their assigned work location. Learn more here. To determine eligibility for a work persona, ServiceNow may confirm the distance between your primary residence and the closest ServiceNow office using a third-party service.
Equal Opportunity Employer
ServiceNow is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, creed, religion, sex, sexual orientation, national origin or nationality, ancestry, age, disability, gender identity or expression, marital status, veteran status, or any other category protected by law. In addition, all qualified applicants with arrest or conviction records will be considered for employment in accordance with legal requirements.
Accommodations
We strive to create an accessible and inclusive experience for all candidates. If you require a reasonable accommodation to complete any part of the application process, or are unable to use this online application and need an alternative method to apply, please contact [email protected] for assistance.
Export Control Regulations
For positions requiring access to controlled technology subject to export control regulations, including the U.S. Export Administration Regulations (EAR), ServiceNow may be required to obtain export control approval from government authorities for certain individuals. All employment is contingent upon ServiceNow obtaining any export license or other approval that may be required by relevant export control authorities.
From Fortune. ©2025 Fortune Media IP Limited. All rights reserved. Used under license.
Principal Security Engineer
Security engineer job in Lake Forest, CA
**AVEVA is a global leader in industrial software. Our cutting-edge solutions are used by thousands of enterprises to deliver the essentials of life - such as energy, infrastructure, chemicals and minerals - safely, efficiently and more sustainably.**
**We're the first software business in the world to have our sustainability targets validated by the SBTi, and we've been recognized for the transparency and ambition of our commitment to diversity, equity, and inclusion. We've also recently been named as one of the world's most innovative companies.**
**If you're a curious and collaborative person who wants to make a big impact through technology, then we want to hear from you! Find out more at AVEVA Careers (**************************************** .**
**For more information about our privacy policy and how to manage cookies, visit our** **Privacy Policy (**************************************************************************************************************************** **.**
**Position:** Principal Security Engineer - Application Security & Incident Response
**Location:** Calgary Canada/ Lake Forest, CA
**Type:** Full time- Hybrid
**Path:** Individual Contributor
**Salary Range:**
$123,500.00 - $205,900.00
**About the Role:**
We're looking for a **Principal Security Engineer** to lead our application security efforts and help protect our global technology environment. This is a hands-on, high-impact role for someone with deep expertise in application security, a strong development background, and real-world breach response experience.
You'll work across engineering and product teams to identify vulnerabilities, guide secure development, and respond to security incidents. As part of our global 24×7 security team, you'll help ensure continuous coverage and rapid response to emerging threats.
**Key Responsibilities:**
+ Lead application security practices across development and deployment workflows.
+ Identify and remediate vulnerabilities in collaboration with engineering teams.
+ Monitor for threats and respond to security incidents across global environments.
+ Apply breach response experience to strengthen threat modeling and security controls.
+ Stay ahead of emerging threats and translate insights into actionable improvements.
+ Develop secure coding standards and mentor teams on best practices.
+ Work as part of a global 24×7 team to ensure consistent security coverage.
**Required Qualifications:**
+ Strong development background with experience in secure coding and software engineering.
+ Proven experience in application security and incident response.
+ Proven experience securing cloud applications (e.g., Azure, AWS, GCP).
+ At least **two years operating at Principal level** or in a senior technical leadership role.
+ Strong understanding of secure development practices and threat modeling.
+ Experience with cloud-native environments, CI/CD pipelines, and containerized applications.
+ Excellent communication and stakeholder engagement skills.
**Preferred Qualifications:**
+ Certifications like CSSLP, OSWE, or GWAPT.
+ Experience with automated security tools and analysis platforms.
+ Familiarity with compliance frameworks (e.g., GDPR, PCI-DSS, ISO 27001).
+ Understanding of the NIS Directive and its impact on security operations.
**R&D at AVEVA**
Our global team of 2000+ developers work on an incredibly diverse portfolio of over 75 industrial automation and engineering products, which cover everything from data management to 3D design. AI and cloud are at the centre of our strategy, and we have over 150 patents to our name.
Our track record of innovation is no fluke - it's the result of a structured and deliberate focus on learning, collaboration and inclusivity. If you want to build applications that solve big problems, join us.
**AVEVA requires all successful applicants to undergo and pass a comprehensive background check before they start employment. Background checks will be conducted in accordance with local laws and may, subject to those laws, include proof of educational attainment, employment history verification, proof of work authorization, criminal records, identity verification, credit check. Certain positions dealing with sensitive and/or third party personal data may involve additional background check criteria.**
**AVEVA is an Equal Opportunity Employer. We are committed to being an exemplary employer with an inclusive culture, developing a workplace environment where all our employees are treated with dignity and respect. We value diversity and the expertise that people from different backgrounds bring to our business.**
**Come and join AVEVA to create the transformative technology that enables our customers to engineer a better world.**
Empowering you with pioneering tech
AVEVA is a global leader in industrial software. Our cutting-edge solutions are used by thousands of enterprises to deliver the essentials of life - such as energy, infrastructure, chemicals and minerals - safely, efficiently and more sustainably.
We're the first software business in the world to have our sustainability targets validated by the SBTi, and we've been recognized for the transparency and ambition of our commitment to diversity, equity, and inclusion. We've also recently been named as one of the world's most innovative companies.
If you're a curious and collaborative person who wants to make a big impact through technology, then we want to hear from you! Find out more at AVEVA Careers (**************************************** .
For more information about our privacy policy and how to manage cookies, visit our Privacy Policy (*********************************************************************************************************************** .
Principal Security Engineer
Security engineer job in Lake Forest, CA
AVEVA is a global leader in industrial software. Our cutting-edge solutions are used by thousands of enterprises to deliver the essentials of life - such as energy, infrastructure, chemicals and minerals - safely, efficiently and more sustainably. We're the first software business in the world to have our sustainability targets validated by the SBTi, and we've been recognized for the transparency and ambition of our commitment to diversity, equity, and inclusion. We've also recently been named as one of the world's most innovative companies.
If you're a curious and collaborative person who wants to make a big impact through technology, then we want to hear from you! Find out more at AVEVA Careers.
For more information about our privacy policy and how to manage cookies, visit our Privacy Policy.
Position: Principal Security Engineer - Application Security & Incident Response
Location: Calgary Canada/ Lake Forest, CA
Type: Full time- Hybrid
Path: Individual Contributor
Salary Range:
$123,500.00 - $205,900.00
About the Role:
We're looking for a Principal Security Engineer to lead our application security efforts and help protect our global technology environment. This is a hands-on, high-impact role for someone with deep expertise in application security, a strong development background, and real-world breach response experience.
You'll work across engineering and product teams to identify vulnerabilities, guide secure development, and respond to security incidents. As part of our global 24×7 security team, you'll help ensure continuous coverage and rapid response to emerging threats.
Key Responsibilities:
* Lead application security practices across development and deployment workflows.
* Identify and remediate vulnerabilities in collaboration with engineering teams.
* Monitor for threats and respond to security incidents across global environments.
* Apply breach response experience to strengthen threat modeling and security controls.
* Stay ahead of emerging threats and translate insights into actionable improvements.
* Develop secure coding standards and mentor teams on best practices.
* Work as part of a global 24×7 team to ensure consistent security coverage.
Required Qualifications:
* Strong development background with experience in secure coding and software engineering.
* Proven experience in application security and incident response.
* Proven experience securing cloud applications (e.g., Azure, AWS, GCP).
* At least two years operating at Principal level or in a senior technical leadership role.
* Strong understanding of secure development practices and threat modeling.
* Experience with cloud-native environments, CI/CD pipelines, and containerized applications.
* Excellent communication and stakeholder engagement skills.
Preferred Qualifications:
* Certifications like CSSLP, OSWE, or GWAPT.
* Experience with automated security tools and analysis platforms.
* Familiarity with compliance frameworks (e.g., GDPR, PCI-DSS, ISO 27001).
* Understanding of the NIS Directive and its impact on security operations.
R&D at AVEVA
Our global team of 2000+ developers work on an incredibly diverse portfolio of over 75 industrial automation and engineering products, which cover everything from data management to 3D design. AI and cloud are at the centre of our strategy, and we have over 150 patents to our name.
Our track record of innovation is no fluke - it's the result of a structured and deliberate focus on learning, collaboration and inclusivity. If you want to build applications that solve big problems, join us.
AVEVA requires all successful applicants to undergo and pass a comprehensive background check before they start employment. Background checks will be conducted in accordance with local laws and may, subject to those laws, include proof of educational attainment, employment history verification, proof of work authorization, criminal records, identity verification, credit check. Certain positions dealing with sensitive and/or third party personal data may involve additional background check criteria.
AVEVA is an Equal Opportunity Employer. We are committed to being an exemplary employer with an inclusive culture, developing a workplace environment where all our employees are treated with dignity and respect. We value diversity and the expertise that people from different backgrounds bring to our business.
Come and join AVEVA to create the transformative technology that enables our customers to engineer a better world.
Cyber security Operations Analyst
Security engineer job in San Diego, CA
Duties and Responsibilities
Maintain and operate cybersecurity technology and and provide expertise in area of focus (e.g. Risk Assessments, Controls Engineering or Incident Response).
Collaborates with the business to understand their needs in order to tailor security offerings unique to their environment.
Uses working knowledge of IT system functionality, architecture and capabilities to effectively diagnose and troubleshoot issues with some assistance.
Conducts competitive analyses on (in-use and alternative) cyber technologies and documents recommendations for our environment.
Provides awareness and guidance within Sempra Infrastructure community on secure business processes, architecture design, and technical controls.
Maintains awareness of evolving cybersecurity threats and best practices for mitigation.
Develops procedures and guidelines for implementing information security systems and practices.
Develops and aggregates metrics to measure, monitor and report on the effectiveness of information security controls and compliance with information security policies.
Performs other duties as assigned (no more than 5% of duties).
Education
Bachelor's degree in Computer Science or other science or technology major or equivalent experience required.
Experience
Minimum of 2-5 years of direct experience within the information security field required.
In-depth experience in at least one cybersecurity discipline required.
Experience with projects of moderately sized security related initiatives to successful completion required.
Demonstrated experience in vendor selection, testing, implementation, and operations of a broad array of security technologies required.
Knowledge, Skills and Abilities
Familiarization with Endpoint protection software such as Trellix and Microsoft Defender.
Familiarization in deploying vulnerability management agents.
Experience deploying logging agents and configurations.
Knowledge of firewalls and security zone.
Experience working in an Operation Technology (OT), ICS / SCADA environment.
Experience with SCADA network protocols.
Experience with OT network monitoring tools (such as but not limited to: Dragos, Cybervision, CyberX).
Ability to take initiative and work independently when needed.
Ability to maintain, upgrade and recommend operational cybersecurity tools.
Ability to work with Cybersecurity OT Engineering to make recommendations for new tools and capabilities.
Ability to work effectively on multiple projects within a team structure and excellent written and oral communication skills.
Licenses and Certifications
Certified Information Systems Security Professional (CISSP) certification, Global Information Security Professional (GISP) certification, Global Information Assurance Certification (GIAC), Certified Information Systems Auditor (CISA), or Certified Internal Auditor (CIA) certificate preferred.
Targeted professional cybersecurity certifications (i.e. forensics and incident response) preferred.
Other Qualifications
Bilingual in English/Spanish preferred.
Platform Security Engineer
Security engineer job in San Diego, CA
Job DescriptionSaronic Technologies is a leader in revolutionizing defense autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations for the Department of Defense (DoD) through autonomous and intelligent platforms.
Saronic Technologies is a leader in defense autonomy at sea. We're seeking a Platform Security Engineer to secure the cloud/edge where vessels, operators, and customers meet. You'll own identity and access patterns, secrets and key management, secure network posture, and policy-as-code guardrails-working across AWS (including GovCloud), Terraform infrastructure, and service code to deliver trustworthy, auditable systems.
Senior Engineers: 3+ years securing production cloud platforms (identity, secrets/KMS, network posture), preferably in autonomy, robotics, aerospace, or defense.
Staff Engineers: 8+ years including technical leadership across secure-by-default platform modules, short-lived credential issuance, and cross-account policy design; demonstrated ownership from design through operational rollout.Key Responsibilities
Design, develop, and maintain secure-by-default infrastructure on
AWS using Terraform (ALB/OIDC, IAM, KMS, Secrets Manager, Route53, VPC/SGs).
Standardize OIDC at the edge (ALB/ingress) for internal and external applications; define scopes, claims, and token lifecycles.
Own secrets and key management: KMS key policies, rotation schedules, cross-account access, and automated issuance for services and tools.
Enforce IMDSv2 required, least-privilege IAM roles, and tight security groups across modules; add CI/policy checks to prevent regressions.
Design secure protocols/APIs for service↔service and boat↔cloud communication (mTLS/TLS, certificate issuance/rotation, revocation).
Manage short-lived credentials used by fleet/overlay services; implement rotation, auditing, and incident response runbooks.
Prefer service-mediated S3 access over broad pre-signed URLs; codify bucket policies, logging, and access boundaries.
Build centralized, tamper-evident logging and audit trails; integrate detections and metrics to validate control effectiveness.
Perform threat modeling and security reviews; document patterns and drive adoption via reusable modules and guides.
Troubleshoot complex security issues in production; lead post-incident reviews and drive remediation to closure.
Stay current on cloud security best practices, especially for defense/government environments.
Required Qualifications:
Bachelor's or Master's degree in Computer Science, Software/Computer/Electrical Engineering, or a related field.
3+ years building on AWS with Terraform (ALB/ELB, IAM, KMS, Secrets Manager, Route53, VPC/SGs).
Strong knowledge of cryptographic and IAM fundamentals (key policies, rotation, certificates, OIDC/OAuth2).
Demonstrated experience enforcing IMDSv2, least-privilege roles, and network controls at scale.
Experience designing secure protocols/APIs and integrating auth into service code (e.g., Go/Rust/TypeScript).
Proven ability to perform threat modeling and conduct design/code security reviews.
Excellent problem-solving and communication skills; effective collaboration across platform, embedded, and field teams.
This role requires the ability to obtain and maintain a security clearance
Preferred Qualifications:
Experience in AWS GovCloud, multi-account landing zones, and cross-account KMS/Secrets patterns
Familiarity with fleet/overlay VPN access control and short-lived credential issuance
Policy-as-code guardrails (e.g., OPA/Conftest, Terraform validations), drift detection, and CI integration
Centralized logging/SIEM and cloud threat detection (e.g., CloudTrail, GuardDuty) with audit readiness
PKI/CA management and, ideally, hardware roots of trust (TPM/secure elements) at the edge
DoD/defense domain familiarity and prior work under export-controlled constraints
Benefits:Medical Insurance: Comprehensive health insurance plans covering a range of services Saronic pays 100% of the premium for employees and 80% for dependents Dental and Vision Insurance: Coverage for routine dental check-ups, orthodontics, and vision care Saronic pays 100% of the premium under the basic plan for employees and 80% for dependents Time Off: Generous PTO and HolidaysParental Leave: Paid maternity and paternity leave to support new parents Competitive Salary: Industry-standard salaries with opportunities for performance-based bonuses Retirement Plan: 401(k) plan Stock Options: Equity options to give employees a stake in the company's success Life and Disability Insurance: Basic life insurance and short- and long-term disability coverage Pet Insurance: Discounted pet insurance options including 24/7 Telehealth helpline Additional Perks: Free lunch benefit and unlimited free drinks and snacks in the office
This role requires access to export-controlled information or items that require “U.S. Person” status. As defined by U.S. law, individuals who are any one of the following are considered to be a “U.S. Person”: (1) U.S. citizens, (2) legal permanent residents (a.k.a. green card holders), and (3) certain protected classes of asylees and refugees, as defined in
8 U.S.C. 1324b(a)(3)
.
Saronic does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.
Network Security Analyst I
Security engineer job in San Diego, CA
Select Cyber, an Information Security recruitment specialty firm, seeks to fill the following role for our client:
Network Security Analyst I
Be part of a cutting-edge Computer Incident Response Team, (CIRT) for a fortune 500 company. We are looking for individuals that want to learn a new field and grow with the company. Training provided.
The selected candidate will be a part of the Security Operations Center (SOC) and its mission to improve the information security of our customers using a Security Information and Event Management (SIEM) tool to detect and analyze IT security incidents.
Responsibilities:
Perform the following functions as individual assignments or as part of a team:
· Monitoring client networks for signs of adversarial activity.
· Respond to alerts from various monitoring systems and platforms providing indicators for enterprise defensive measures.
· Analyze reports to understand threat campaign(s) techniques, lateral movements and extract indicators of compromise (IOCs).
· Triage potentially malicious events to determine severity and criticality of the event.
· Follow procedures to analyze and escalate security incidents which vary from customer to customer.
Experience
· 1+ years technical experience in the Information Technology field.
· Experience with Intrusion Detection & Prevention Systems (IDS/IPS) or Firewalls & Log Analysis a plus.
· Technical degree, Associate or Bachelor's degree from an accredited institution in Computer Science or information technology field preferred.
· CompTIA Network+/Security+ certifications is a plus
Cyber Security Analyst
Security engineer job in Costa Mesa, CA
The Orange County Department of Education (OCDE) serves some of Orange County's most vulnerable student populations and provides support and mandated fiscal oversight to 28 school districts serving more than 600 schools and approximately 475,000 students. In addition to providing direct instruction to students through its own alternative and special education programs, OCDE administers an array of programs and services that are critical to the operations of local school districts and community colleges, facilitating professional development, legal guidance, payroll, career and technical education support, high-speed internet access, Local Control and Accountability Plan assistance and approval, resources for families, and student enrichment. OCDE's vision is that "Orange County students will lead the nation in college and career readiness and success." Department staff are working to achieve this goal in collaboration with educators at all levels of student development, from early childhood through higher education, and in partnership with families, businesses and community organizations.
See attachment on original job posting
Education and Experience: Any combination of education and experience that would likely provide the required knowledge and abilities is qualifying. A typical way to obtain the knowledge and abilities would be: • Bachelor's degree or equivalent from an accredited college or university with major course work in information security, or a related field. • One to two years of experience in information security technology, specifically with penetration testing, intrusion detection, incident response, or digital forensics; or an equivalent combination of training and experience.
There are supplemental questions in the application. Please note that the EdJoin system will time-out after a 20-minute period of perceived inactivity. To assist you in the preparation of your application, the supplemental questions are listed here. Your responses should be thoughtful and thorough, and within the limit of 5,000 characters or less. We recommend that you prepare your responses in advance of beginning the application. 1. Explain a cybersecurity framework or methodology you know and how you have applied it in a previous role or project. 2. Describe your approach to investigating and assessing cybersecurity events and incidents. How do you prioritize incidents, and what criteria do you use to determine severity and impact? 3. Why are you passionate about pursuing a career in cybersecurity, and how do you stay current with the latest trends and developments in the field? Notice to Applicants: If you require accommodations in the application process, please inform us.
Education and Experience: Any combination of education and experience that would likely provide the required knowledge and abilities is qualifying. A typical way to obtain the knowledge and abilities would be: • Bachelor's degree or equivalent from an accredited college or university with major course work in information security, or a related field. • One to two years of experience in information security technology, specifically with penetration testing, intrusion detection, incident response, or digital forensics; or an equivalent combination of training and experience.
There are supplemental questions in the application. Please note that the EdJoin system will time-out after a 20-minute period of perceived inactivity. To assist you in the preparation of your application, the supplemental questions are listed here. Your responses should be thoughtful and thorough, and within the limit of 5,000 characters or less. We recommend that you prepare your responses in advance of beginning the application. 1. Explain a cybersecurity framework or methodology you know and how you have applied it in a previous role or project. 2. Describe your approach to investigating and assessing cybersecurity events and incidents. How do you prioritize incidents, and what criteria do you use to determine severity and impact? 3. Why are you passionate about pursuing a career in cybersecurity, and how do you stay current with the latest trends and developments in the field? Notice to Applicants: If you require accommodations in the application process, please inform us.
Comments and Other Information
Resumes will not be accepted in lieu of the completed online application. Before receiving authorization to work in this position, the individual selected will be required to provide a current negative TB authorization, within the last 60 days, and submit fingerprints for the purpose of conducting a confidential background investigation and record check. The tests are arranged and paid for by OCDE. The Immigration Reform and Control Act of 1986 requires employers to verify the employability of all new employees. Before the Department will finalize an offer of employment, the candidate selected will be required to show original documents which establish both the individual's identity and employment authorization. The candidate must also sign a statement under penalty of perjury regarding his/her employability. We reserve the right to reopen, readvertise, or delay filling this position. AA/EOE/ADA
Sr. Cyber Security Operations Analyst
Security engineer job in Irvine, CA
at loan Depot
loan Depot's Security Operations team is at the forefront of cyber defense for the organization. We are seeking a Senior Security Analyst who will act as both a technical authority and front-line commander within our Security Operations Center. This is a strategic, high-impact role for a seasoned professional who can seamlessly integrate with our team on Day One, bringing the composure, knowledge, experience, and precision necessary to contain and eradicate cyber threats from our environment.Reporting directly to the Information Security Operations Manager, this position partners closely with our Level 1 MSSP, internal business units, and external incident response partners to ensure that every incident is managed with accountability, consistency, and efficiency. The ideal candidate is resourceful, quick-thinking, and deeply fluent with the leading security stacks and tools, capable of turning strands of data into decisive action and information. The Sr. Cyber SOC Analyst must be able to come into the Irvine, CA office 2-3 times per week.
Responsibilities:
Lead and execute end-to-end security incident response activities including detection and triage, containment, eradication, and recovery for incidents ranging from simple to complex.
Serve as incident commander for high-severity security events, ensuring clear communication and timely resolution across stakeholders.
Partner with Level 1 MSSP partners to validate escalations, refine detection logic, and ensure consistent handling workflows.
Coordinate with external partners and internal teams to contain and mitigate threats while maintaining operational resilience.
Detection, Analysis, & Threat Hunting
Utilize industry standard and/or custom tools for telemetry to conduct deep-dive investigations and root cause analysis.
Develop and optimize queries, analytic rules, and playbooks to enhance threat detection and automation, pushing incidents towards level 0 where possible.
Conduct proactive threat hunts and adversary emulation exercises to identify emerging tactics, techniques, and procedures (TTPs) before they escalate into incidents.
Leverage MITRE ATT&CK, NIST SP800-61r3, NIST CSF2, and other frameworks to ensure methodical and repeatable investigation practices.
Operational Excellence & Leadership
Document and refine incident response playbooks and runbooks to improve team consistency and speed.
Produce detailed incident reports, post-incident reviews, and executive summaries with actionable insights.
Mentor other analysts and emerging prospects, reinforcing our culture of accountability, consistency, and efficiency.
Participate in weekly high-severity incident case reviews and contribute to the continuous improvement of SOC metrics and performance.
Other duties as assigned.
Requirements:
Bachelor's Degree in a related field preferred, but not required.
Minimum of five (5) + years' experience working in a security operations center or similar environment preferred.
A demonstrated mastery of industry leading tools in SIEM, EDR, and CSPM.
Expertise in querying, hunting, and correlating disparate data points across large telemetry datasets using SQL/KQL/Cypher.
A demonstrated ability to lead complex investigations and coordinate across technical and business stakeholders.
A solid understanding of cybersecurity frameworks such as MITRE ATT&CK, NIST CSF 2, NIST SP800-61r3.
Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant narratives.
Experience in log aggregation technologies and SIEM tuning processes.
Experience in the Mortgage industry preferred.
CISSP, GIAC Certified Incident Handler, or other related certifications preferred.
Why work for #teamloan Depot:
Competitive compensation based on skillset and relatable experience.
Work with other passionate, purposeful, and customer-centric team members.
Inclusive, diverse, and collaborative culture where people from all backgrounds can thrive.
Extensive internal growth and professional development opportunities including tuition reimbursement.
Comprehensive benefits package including Medical/Dental/Vision.
Wellness program to support both mental and physical health.
Discretionary Time Off (DTO) policy to support work-life balance in addition to Paid Voluntary Time Off.
About loan Depot:
loan Depot (NYSE: LDI) is a digital commerce company committed to serving its customers throughout the home ownership journey. Since its launch in 2010, loan Depot has revolutionized the mortgage industry with a digital-first approach that makes it easier, faster, and less stressful to purchase or refinance a home. Today, loan Depot enables customers to achieve the American dream of homeownership through a broad suite of lending and real estate services that simplify one of life's most complex transactions. With headquarters in Southern California and offices nationwide, loan Depot is committed to serving the communities in which its team lives and works through a variety of local, regional, and national philanthropic efforts. Base pay is one part of our total compensation package and is determined within a range. This provides the opportunity to progress as you grow and develop within a role. The base pay for this roles is between $99,000 and $136,000. Your base pay will depend on multiple individualized factors, including your job-related knowledge/skills, qualifications, experience, and market location. We are an equal opportunity employer and value diversity in our company. We do not discriminate based on race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
Auto-ApplyCyber Security Analyst (MSSP/SOC)
Security engineer job in San Diego, CA
Hey there, Rockstar! 🚀 We are looking for you!
At Agile IT, we help organizations thrive by making technology simple, secure, and strategic. As a trusted Microsoft partner and CMMC Registered Practitioner Organization (RPO), we specialize in guiding businesses through the complexities of cloud adoption, cybersecurity, and compliance, so they can focus on achieving their mission without being slowed down by IT challenges.
We combine deep technical expertise with a people-first approach to deliver solutions that actually work in the real world. From CMMC compliance and security to cloud migration, collaboration, and ongoing managed services, Agile IT empowers organizations to modernize with confidence and agility.
Why Work at Agile IT?
Impactful Work: Everything you touch helps to keep our nation's secrets secure while also helping our client organizations thrive, making technology a true enabler instead of a roadblock.
Culture of Growth: We're a team of curious learners and problem-solvers, and we invest in developing your expertise through training, certifications, and hands-on experience.
Flexibility & Balance: With a remote-friendly environment and a people-first approach, you get the freedom to do your best work while living your best life.
Collaborative Team: At Agile IT, you're surrounded by passionate professionals who support one another and celebrate success together.
Forward-Thinking Mindset: We stay ahead of industry shifts so our team and our clients are always future-ready.
Joining Agile IT means being part of a company that isn't just adapting to the future of IT-it's shaping it.
Job Description
At Agile IT, supporting CMMC-compliant environments means we don't just fix problems-we prevent them.
As a Security Analyst at Agile IT, you'll play a critical role in safeguarding our clients. You'll monitor and analyze security events, investigate incidents, and collaborate with senior engineers and architects to deliver world-class managed security services. This is an excellent platform to sharpen your analytical and technical skills while protecting clients in today's ever-changing threat landscape. This position is designed to nurture your career growth, providing a pathway into the dynamic and evolving field of cybersecurity operations and defense.
What you do: (major responsibilities)
Monitor and analyze security events across client environments.
Investigate alerts, perform triage, and escalate incidents when needed.
Conduct threat analysis and provide actionable recommendations to reduce risk.
Assist in incident response activities, including root cause analysis and reporting.
Tune and improve detection rules and security use cases to enhance visibility.
Communicate findings clearly to both technical and non-technical stakeholders.
Stay up to date on emerging threats, vulnerabilities, and trends.
Qualifications
What sets you apart: (qualifications-knowledge, skills, and abilities)
2+ years of experience in a SOC/NOC or MSSP in cybersecurity; OR 5+ years of experience in cybersecurity operations role.
Familiarity with SIEM tools (Sentinel, Splunk, QRadar, etc.).
Strong understanding of networking, firewalls, IDS/IPS, and endpoint protection.
Knowledge of security frameworks such as MITRE ATT&CK, NIST, or CIS Controls.
Excellent problem-solving and communication skills.
A collaborative mindset with the ability to work across teams and with customers.
Nice to have skills: (preferred skills or skills that will be expected to learn)
Certifications such as SC-200, Network+, Security+, CySA+, CEH, CISSP, or equivalent.
Experience with Microsoft Security tools (Defender, Sentinel, Purview, Entra).
Exposure to cloud platforms (Microsoft Azure, AWS, Google Cloud).
Familiarity with compliance frameworks (CMMC, NIST 800-171, HIPAA, ISO 27001).
Additional Information
A writing sample will be requested from candidates who are chosen to move forward in the interview process.
THE FINE PRINT:
Compensation and Benefits
*Pay range is $62,400 to $83,200 per year.
Starting pay is generally lower to mid-range; based on experience.
This is a remote, full-time, non-exempt position.
Medical/Dental/Vision/STD/LTD
Remote mental and physical health networks
$200,000 basic life insurance
Voluntary life
401(k) with 3% employer contribution - no vesting period
Combined 18 days PTO increasing with tenure
9 paid holidays
And so much more
*Factors in determining the appropriate compensation for a role include experience, skills, knowledge, abilities, education, licensure and certifications, and other business and organizational needs. The Hiring Pay Scale referenced in the job posting is the budgeted salary or hourly range that Agile IT reasonably expects to pay for this position.
Background checks, pre-employment aptitude, and skills testing are a mandatory part of the recruitment process. All Agile IT employees are provided with laptops and home office equipment. Due to the contractual requirements of our work with government entities, all hires must be US Citizens.
We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. All your information will be kept confidential according to EEO guidelines.
Senior Security Engineer
Security engineer job in Irvine, CA
About GoodLeap:GoodLeap is a technology company delivering best-in-class financing and software products for sustainable solutions, from solar panels and batteries to energy-efficient HVAC, heat pumps, roofing, windows, and more. Over 1 million homeowners have benefited from our simple, fast, and frictionless technology that makes the adoption of these products more affordable, accessible, and easier to understand. Thousands of professionals deploying home efficiency and solar solutions rely on GoodLeap's proprietary, AI-powered applications and developer tools to drive more transparent customer communication, deeper business intelligence, and streamlined payment and operations. Our platform has led to more than $30 billion in financing for sustainable solutions since 2018. GoodLeap is also proud to support our award-winning nonprofit, GivePower, which is building and deploying life-saving water and clean electricity systems, changing the lives of more than 1.6 million people across Africa, Asia, and South America.
Position Summary The GoodLeap security team is responsible for both business enablement and safeguarding the organization's information assets; it is involved in virtually all aspects of the business, from product safety and resilience, to building security paved roads, customer, partner, and regulatory trust, managing technology governance and compliance, and ensuring the privacy, and safety of GoodLeap's customers, partners, and employees information.
The senior security engineer role provides a unique opportunity to shape the security and resilience of GoodLeap corporate systems, services, and operational processes. In this role, you will work closely with product, engineering, IT, and business teams within GoodLeap, acting as the key individual with both the authority and responsibility to ensure the safety and resilience of enterprise systems, products, and services.
Your oversight will encompass: - Enterprise systems:Identifying potential misuse and abuse cases, proposing solutions to address these scenarios, and identifying product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. - Build-time controls: Managing applications/products security controls and activities during development. - Runtime controls: Overseeing security measures at runtime, from prevention to detection and response.
Additionally, you will be involved with aspects of internally built products and represent all areas of security, spanning governance, risk, and compliance (GRC) to security monitoring, for a number of departments/teams. You will also have the authority and ability to involve other security team members as needed.
While you will take on multiple responsibilities-from advisor to builder and beyond-your primary focus will be designing and building security patterns and practices for services and processes, and fostering strong relationships with product, business, and engineering. Essential Job Duties & Responsibilities
Lead, participate in, and contribute to partnerships between security, IT, General & Administrative teams, engineering, product, and operations teams to build, orchestrate, and automate security controls and services in GoodLeap enterprise systems, products, services, and operational processes.
Identify potential misuse and abuse cases in enterprise systems, propose solutions to address these scenarios, and identify product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements.
Support or develop components of the security analytics platform.
Contribute to investigations, threat hunting, and incident response activities in a supporting role.
Collaborate with the monitoring and response team to create playbooks for specific incident response scenarios related to the products and services you oversee. These investigations, incidents, and playbooks may address security, fraud, privacy, resilience, and related concerns.
Support the security operations team with the vulnerability management lifecycle for products and services under your purview.
Ensure technical alignment for the products and services you oversee with team initiatives, including GRC, security operations, and monitoring and response activities.
Required Skills, Knowledge & Abilities
Strong communicator with the ability to lead technical architecture discussions, drive technical decisions, and effectively communicate with non-technical audiences.
Expertise in agile product lifecycles. Ideally, you have experience in a product manager or engineering manager role and understand how SaaS products (B2B, B2B2C, and B2C) are built, including roadmap planning and feature and defect prioritization.
Experience with threat modeling methodologies, with the ability to create efficient and scalable approaches to conducting such assessments.
Familiarity with AWS services, including KMS, SST, Container Registry, ELBs, Lambda, API Gateway, CloudTrail, and IAM (knowledge of GCP and/or Azure is a plus).
Proven ability to establish credibility and build trust with business, engineers, and operational staff; confident yet humble.
Hands-on experience with managing security for core enterprise systems, e.g., ERP, HCM, Salesforce, etc.
Strong understanding of both human and non-human identity management and common enterprise and consumer authentication standards and use cases.
Practical experience with CI/CD pipelines and DevOps tools, including Infrastructure-as-Code (IaC) tools like Terraform, Pulumi, or CDK; GitHub and GitHub Actions; artifact management; and secrets management tools like Doppler and HashiCorp Vault.
Passionate about learning new technologies. While you're not expected to know everything, you should demonstrate a willingness and ability to learn as needed.
Prior experience interfacing and supporting with G&A teams, internal product teams, and other cross-functional areas.
Proficiency in writing automation scripts in multiple languages, with prior experience automating security processes in cloud or SaaS environments.
Experience engaging with vendors in design partnerships.
Experience overseeing vulnerability and threat management at the platform and application levels.
Familiarity with penetration testing and red team exercises, including manual verification, exploitation, and lateral movement.
Ability to balance a high-level view of security strategy with attention to detail, ensuring thorough and effective execution.
Additional Information Regarding Job Duties and s:
Job duties include additional responsibilities as assigned by one's supervisor or other managers related to the position/department. This job description is meant to describe the general nature and level of work being performed; it is not intended to be construed as an exhaustive list of all responsibilities, duties and other skills required for the position. The Company reserves the right at any time with or without notice to alter or change job responsibilities, reassign or transfer job position or assign additional job responsibilities, subject to applicable law. The Company shall provide reasonable accommodations of known disabilities to enable a qualified applicant or employee to apply for employment, perform the essential functions of the job, or enjoy the benefits and privileges of employment as required by the law.
If you are an extraordinary professional who thrives in a collaborative work culture and values a rewarding career, then we want to work with you! Apply today!
We are committed to protecting your privacy. To learn more about how we collect, use, and safeguard your personal information during the application process, please review our Employment Privacy Policy and Recruiting Policy on AI.
Auto-ApplyInformation Security Analyst - Journeyman - Secret Cleared
Security engineer job in San Diego, CA
Perrygo is a small, rapidly growing company; we are passionate about our employees as well as supporting our customers and their mission. We are excited for the opportunity to bring aboard highly motivated and energetic individuals to join our teams. Currently, we are seeking a Information Security Analyst - Secret Cleared. This role supports a Navy customer in San Diego, CA.
Job Description and Responsibilities: Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses
- Implement and monitor information security policies and procedures.
- Conduct vulnerability scans and risk assessments.
- Support RMF documentation and ATO renewals.
- Respond to and document security incidents and audits.
Basic Requirements: 6+ years of experience in information assurance or cybersecurity
Preferred Skills and Experience:
DoD 8570 IAT Level II certification (Security+ CE, CySA+, or equivalent).
Familiarity with NIST, DISA STIGs, and DoD RMF compliance.
Education Requirements: Bachelor's degree in Cybersecurity, Computer Science, or related field.
Security Clearance: Secret(must be a US Citizen)
Telework and Travel: On-Site.
Contract: This position is pending a contract award.
Perrygo Consulting Group, LLC is an Equal Opportunity Employer, for all individuals, including protected veterans and those with disabilities. All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, disability, or veteran status.
Perrygo Consulting Group, LLC participates in E-Verify.
If being a part of a small, growing company while having the opportunity to work on exciting projects with challenging tasks excites you - then please apply today!
Compensation Package - We offer an excellent compensation package with competitive salaries and meaningful benefits, including:
Paid Time Off (PTO)/Sick Leave
11 Paid Holidays
Flexible Work Schedules (offering a healthy work-life balance whenever possible)
Employee Assistance Program (EAP)
Medical, Dental, and Vision
LTD/STD, AD&D, and Life-Employer Paid
Supplemental Life and Accident options
Health Savings Account (HSA) with employer contribution
401K Plan with employer Safe Harbor contribution
Profit Sharing Plan
Information Security Analyst
Security engineer job in San Diego, CA
Requirements
Bachelor's degree in Cybersecurity, Computer Science, or related field.
3+ years of experience in information assurance or cybersecurity.
DoD 8570 IAT Level II certification (Security+ CE, CySA+, or equivalent).
Familiarity with NIST, DISA STIGs, and DoD RMF compliance.
Must possess an active Secret Clearance - Required
This contractor and subcontractor shall abide by the requirements of 41 CFR §§ 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on their race, color, religion, sex, sexual orientation, gender identity or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment individuals without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status or disability.
Salary Description $88,000-$102,000
Cybersecurity Lead/Information Systems Security Officer (ISSO)
Security engineer job in San Diego, CA
Data Intelligence, LLC is seeking a highly experienced Cyber Security Lead / Information Systems Security Officer (ISSO) to support cybersecurity operations and compliance for Navy and Department of Defense (DoD) systems. This role requires deep expertise in Information Assurance (IA), cybersecurity compliance frameworks, and Navy-specific cybersecurity practices. The ideal candidate will have extensive experience working with Navy Cross Domain Solutions (NCDSO) and a strong technical background in military C4I/IT systems.
Key Responsibilities:
Serve as the Cyber Security Lead/ISSO for classified and unclassified Navy/DoD systems.
Lead Risk Management Framework (RMF) efforts in accordance with DoD 8500 Series, NIST SP 800 Series, and other applicable cybersecurity policies and guidelines.
Develop, review, and manage technical documentation including System Security Plans (SSPs), Security Assessment Reports (SARs), and Plan of Action & Milestones (POA&Ms).
Interface with the Navy Cross Domain Solutions Office (NCDSO) to support secure cross-domain solutions, including submission packages and coordination of approvals.
Provide subject matter expertise in support of system security engineering, integration, and testing.
Coordinate with system engineers, developers, and stakeholders to ensure security controls are effectively implemented.
Monitor systems for compliance with DFARS Clause ************ and other DoD IA requirements.
Assist in the preparation and review of technical instructions, engineering plans, and test-related documentation.
Maintain up-to-date knowledge of emerging cybersecurity threats, tools, and regulatory requirements.
Support system Certification and Accreditation (C&A) processes in accordance with NSA and DoD standards.
Required Qualifications:
Education:
Master's degree from an accredited college or university in Computer Science, Information Systems Management, Cybersecurity, or a related field.
Experience:
Minimum of 10 years of Navy or DoD experience in Information Assurance and Cybersecurity.
At least 5 years of recent experience (within the last 5 years) directly supporting Navy cybersecurity programs and RMF processes.
Direct experience with the Navy Cross Domain Solutions Office (NCDSO) within the last five years.
Demonstrated expertise in DoD cybersecurity requirements, including the DoD 8500 Series and NIST SP 800 Series.
Experience with engineering documentation including technical instructions, engineering plans, and systems integration documents.
Strong understanding of military C4I/IT systems, including Navy SATCOM (MILSATCOM and Commercial), Tactical Communications, and GPS systems.
High familiarity with the NSA certification process for secure systems.
Certifications:
Compliant with DFARS Clause ************ for Information Assurance Contractor Training and Certification (e.g., CISSP, CISM, Security+, or equivalent).
Security Clearance:
Must hold an active Top Secret / SCI (TS/SCI) clearance.
Preferred Skills:
Strong leadership and communication skills with the ability to brief senior stakeholders.
Ability to lead complex cybersecurity projects with minimal supervision.
In-depth knowledge of secure system design and implementation in classified environments.
Experience collaborating with cybersecurity authorities across Navy and DoD organizations.
About Data Intelligence, LLC:
Data Intelligence, LLC (DI) is a small business that provides Information Technology System Development (Agile, DevSecOps, Cloud Platform support) Cybersecurity (RMF, Security Engineering, Cross Domain Solutions), Tactical Data Link Standards Development and Testing, and Logistics/Warehousing services to U.S. federal clients both CONUS and OCONUS. DI consistently demonstrates exceptional customer service, maintains an employee-centric culture, and delivers hands-on technical expertise to help our clients achieve their mission.
Since 2005, DI has successfully provided IT Systems Engineering, Software Development, Cybersecurity, and supporting solutions and services to customers that include the Department of Defense, Intelligence, and Federal Civilian clients. Current clients include the US Navy, Air Force, Army, Marine Corps, Coast Guard, National Geospatial-Intelligence Agency, Defense Logistics Agency, and The Department of Homeland Security. DI is headquartered in Marlton, New Jersey, with satellite offices in California, Maryland, Ohio, Pennsylvania, Virginia, and Washington, D.C.
Why you should join us:
Data Intelligence offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays.
Data Intelligence is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
Information Security Analyst II
Security engineer job in San Diego, CA
Why PlayStation?
PlayStation isn't just the Best Place to Play - it's also the Best Place to Work. Today, we're recognized as a global leader in entertainment producing The PlayStation family of products and services including PlayStation 5, PlayStation 4, PlayStation VR, PlayStation Plus, acclaimed PlayStation software titles from PlayStation Studios, and more.
PlayStation also strives to create an inclusive environment that empowers employees and embraces diversity. We welcome and encourage everyone who has a passion and curiosity for innovation, technology, and play to explore our open positions and join our growing global team.
The PlayStation brand falls under Sony Interactive Entertainment, a wholly-owned subsidiary of Sony Group Corporation.
PlayStation is looking for an Information Security Analyst to join our team and operate the day-to-day Information Security, Risk and Compliance management processes. This is a mixture of processing requests from the business and driving internal security projects such as security audit and assessment. This role requires a sound understanding of technical and engineering terminology, outstanding ability to articulate risk across any security domains (technical and governance) with the demonstrable ability to work independently and process high volumes of security requests on a weekly basis. This role also provides ample opportunity to work across technical and game-related projects with studio and PlayStation engineering teams and therefore requires risk advisory and influencing experience.
Based in San Diego, the candidate will be the key business relationship partner on behalf of Information Security and work on Information Security processes as well as strategic projects across PlayStation and the Studios group. This role will collaborate closely directly with business, technical and third party collaborators, as well as work multi-functionally with our other Information Security specialist teams across the globe to protect PlayStation's intellectual property, data and infrastructure whilst delivering new and evolving games, services and hardware to the market. This is an opportunity to provide security directly to the global PlayStation business, our PlayStation Network and global Studios and their game development.
What you will be doing:
Serve as a primary partner to PlayStation Studios, supporting security risk management across global game development and studio environments.
Triage and manage technical and strategic security risks across studios, ensuring alignment to security strategy and policy compliance.
Engage directly with technical teams and studio leadership to strengthen risk posture, manage vulnerabilities, and drive mitigation strategies.
Act as a trusted advisor to studio teams, driving a culture of embedding “security by design” principles.
Support the creation of risk insights, reporting, and executive briefings that inform leadership on studio security health and emerging trends.
Maintain broad knowledge of emerging security trends, risks, adn technologies that are applicable to the studio business and Sony at large.
Advance the Information Security program through collaborative and cross-team partnerships.
Required Experience:
3+ years of experience in information security, with demonstrated expertise in risk identification and mitigation.
2+ years conducting risk assessments and providing actionable recommendations to technical and business stakeholders.
2+ years working in vulnerability management, including detection, analysis, reporting, or remediation tracking.
2+ years of hands-on experience managing or evaluating cloud environments, networks, and security infrastructure.
2+ years of experience communicating risk and security insights to leadership and cross-functional partners.
Preferred Experience & Attributes:
Background in the gaming or entertainment industry.
Experience leading projects or programs in a security or risk management capacity.
Technical and Security focused certifications a strong preference
Confident communicator able to translate complex security risk concepts for both technical and non-technical audiences.
Comfortable working in a dynamic, fast-paced environment balancing innovation and security priorities.
Proven success working independently to establish relationships, deliver requirements, and communicate effectively.
#LI-GM1
Please refer to our Candidate Privacy Notice for more information about how we process your personal information, and your data protection rights.
At SIE, we consider several factors when setting each role's base pay range, including the competitive benchmarking data for the market and geographic location.
Please note that the base pay range may vary in line with our hybrid working policy and individual base pay will be determined based on job-related factors which may include knowledge, skills, experience, and location.
In addition, this role is eligible for SIE's top-tier benefits package that includes medical, dental, vision, matching 401(k), paid time off, wellness program and coveted employee discounts for Sony products. This role also may be eligible for a bonus package. Click here to learn more.
The estimated base pay range for this role is listed below.$140,000-$210,000 USD
Equal Opportunity Statement:
Sony is an Equal Opportunity Employer. All persons will receive consideration for employment without regard to gender (including gender identity, gender expression and gender reassignment), race (including colour, nationality, ethnic or national origin), religion or belief, marital or civil partnership status, disability, age, sexual orientation, pregnancy, maternity or parental status, trade union membership or membership in any other legally protected category.
We strive to create an inclusive environment, empower employees and embrace diversity. We encourage everyone to respond.
PlayStation is a Fair Chance employer and qualified applicants with arrest and conviction records will be considered for employment.
Auto-ApplyStaff Product Security Engineer (SSDL)
Security engineer job in San Diego, CA
It all started in sunny San Diego, California in 2004 when a visionary engineer, Fred Luddy, saw the potential to transform how we work. Fast forward to today - ServiceNow stands as a global market leader, bringing innovative AI-enhanced technology to over 8,100 customers, including 85% of the Fortune 500 . Our intelligent cloud-based platform seamlessly connects people, systems, and processes to empower organizations to find smarter, faster, and better ways to work. But this is just the beginning of our journey. Join us as we pursue our purpose to make the world work better for everyone.
****PLEASE NOTE**: This role requires a minimum of 2 days per week in our San Diego, CA ServiceNow Office. Please do not apply if you cannot meet this requirement. Thank you**
**The ServiceNow Security Organization (SSO):**
The ServiceNow Security Organization (SSO) delivers world-class, innovative security solutions to reduce risk and protect the company and our customers. We enable our customers to migrate their most sensitive data and workloads to the cloud, accelerating our business so that we are the most trusted SaaS provider. We create an environment where our employees are proud to work and can make a positive impact
**Team:**
Product Security is Shifting Everywhere and holistically improving the maturity of the security program. The Secure Software Development Lifecycle (SSDL) team helps the organization measure and improve security activities. The team leads product threat modeling, helps to improve security behaviors, and manages a highly visible security champions program. The team is both highly technical and strategic.
**Role:**
As a Staff Product Security Engineer on the ServiceNow SSDL team, you will collaborate with developers and software architects on highly technical solutions and help the organization build secure and resilient software. You will be threat modeling software products and services to identify potential risk and participate in architectural reviews of products in development.
A key part of this position is to ensure the continued success of a large and growing security champions program. You will help mentor security champions and assist them in secure software design. As a Staff Product Security Engineer, you will help security champions be successful.
**What you get to do in this role:**
+ Work on a wide range of technologies
+ Work on complex architectural and technical challenges
+ Participate in threat modeling activities
+ Mentor and collaborate with development teams to adopt secure coding practices
+ Work on strategic and highly visible security activities across the organization
+ Be an advocate for security and participate in a security champions program
**To be successful in this role, we need someone who has:**
+ Experience in leveraging or critically thinking about how to integrate AI into work processes, decision-making, or problem-solving. This may include using AI-powered tools, automating workflows, analyzing AI-driven insights, or exploring AI's potential impact on the function or industry.
+ 2+ years of experience in software development
+ 8+ years of experience in software security (AppSec)
+ 2+ years of experience in threat modeling software applications and services
+ Proficient in threat modeling methodologies such as STRIDE or PASTA and their applied use in fast-moving, iterative development lifecycles
+ In-depth knowledge of common web application vulnerabilities (OWASP Top 10)
+ Developer-level proficiency in one or more languages - Python, Java, JavaScript, and Golang preferred
+ Working knowledge of Machine Learning and taxonomies such as BIML that categorize known attacks on machine learning models
+ In-depth knowledge of software design patterns and their security considerations
+ In-depth knowledge of authentication and authorization standards including OAuth, OIDC, SAML, JWT, and PASETO
+ Knowledge of symmetric and asymmetric cryptography, digital signatures, PKI, TLS, and cryptographic hash functions
+ Knowledge of cloud native technologies including containers, Kubernetes, and services provided by AWS, GCP, and Azure
+ Knowledge of static analysis (SAST), dynamic analysis (DAST), and software composition analysis (SCA) security tools
+ Knowledge of OWASP ASVS, SCVS, and related verification standards
+ Ability to work collaboratively in a highly distributed team
+ Ability to communicate technical concepts to business stakeholders
+ A passion for security
**\#SecurityJobs**
For positions in this location, we offer a base pay of: $155,800 to $272,700 plus equity (when applicable), variable/incentive compensation and benefits. Sales positions generally offer a competitive On Target Earnings (OTE) incentive compensation structure. Please note that the base pay shown is a guideline, and individual total compensation will vary based on factors such as qualifications, skill level, competencies, and work location. We also offer health plans, including flexible spending accounts, a 401(k) Plan with company match, ESPP, matching donations, a flexible time away plan and family leave programs.
Compensation is based on the geographic location in which the role is located and is subject to change based on work location.
**Work Personas**
We approach our distributed world of work with flexibility and trust. Work personas (flexible, remote, or required in office) are categories that are assigned to ServiceNow employees depending on the nature of their work and their assigned work location. Learn more here (************************************************************************************************************************************* . To determine eligibility for a work persona, ServiceNow may confirm the distance between your primary residence and the closest ServiceNow office using a third-party service.
**Equal Opportunity Employer**
ServiceNow is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, creed, religion, sex, sexual orientation, national origin or nationality, ancestry, age, disability, gender identity or expression, marital status, veteran status, or any other category protected by law. In addition, all qualified applicants with arrest or conviction records will be considered for employment in accordance with legal requirements.
**Accommodations**
We strive to create an accessible and inclusive experience for all candidates. If you require a reasonable accommodation to complete any part of the application process, or are unable to use this online application and need an alternative method to apply, please contact ***************************** for assistance.
**Export Control Regulations**
For positions requiring access to controlled technology subject to export control regulations, including the U.S. Export Administration Regulations (EAR), ServiceNow may be required to obtain export control approval from government authorities for certain individuals. All employment is contingent upon ServiceNow obtaining any export license or other approval that may be required by relevant export control authorities.
From Fortune. ©2025 Fortune Media IP Limited. All rights reserved. Used under license.
Senior Security Engineer
Security engineer job in Irvine, CA
About GoodLeap:GoodLeap is a technology company delivering best-in-class financing and software products for sustainable solutions, from solar panels and batteries to energy-efficient HVAC, heat pumps, roofing, windows, and more. Over 1 million homeowners have benefited from our simple, fast, and frictionless technology that makes the adoption of these products more affordable, accessible, and easier to understand. Thousands of professionals deploying home efficiency and solar solutions rely on GoodLeap's proprietary, AI-powered applications and developer tools to drive more transparent customer communication, deeper business intelligence, and streamlined payment and operations. Our platform has led to more than $30 billion in financing for sustainable solutions since 2018. GoodLeap is also proud to support our award-winning nonprofit, GivePower, which is building and deploying life-saving water and clean electricity systems, changing the lives of more than 1.6 million people across Africa, Asia, and South America.
Position Summary The GoodLeap security team is responsible for both business enablement and safeguarding the organization's information assets; it is involved in virtually all aspects of the business, from product safety and resilience, to building security paved roads, customer, partner, and regulatory trust, managing technology governance and compliance, and ensuring the privacy, and safety of GoodLeap's customers, partners, and employees information.
The senior security engineer role provides a unique opportunity to shape the security and resilience of GoodLeap corporate systems, services, and operational processes. In this role, you will work closely with product, engineering, IT, and business teams within GoodLeap, acting as the key individual with both the authority and responsibility to ensure the safety and resilience of enterprise systems, products, and services.
Your oversight will encompass: - Enterprise systems:Identifying potential misuse and abuse cases, proposing solutions to address these scenarios, and identifying product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. - Build-time controls: Managing applications/products security controls and activities during development. - Runtime controls: Overseeing security measures at runtime, from prevention to detection and response.
Additionally, you will be involved with aspects of internally built products and represent all areas of security, spanning governance, risk, and compliance (GRC) to security monitoring, for a number of departments/teams. You will also have the authority and ability to involve other security team members as needed.
While you will take on multiple responsibilities-from advisor to builder and beyond-your primary focus will be designing and building security patterns and practices for services and processes, and fostering strong relationships with product, business, and engineering. Essential Job Duties & Responsibilities
Lead, participate in, and contribute to partnerships between security, IT, General & Administrative teams, engineering, product, and operations teams to build, orchestrate, and automate security controls and services in GoodLeap enterprise systems, products, services, and operational processes.
Identify potential misuse and abuse cases in enterprise systems, propose solutions to address these scenarios, and identify product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements.
Support or develop components of the security analytics platform.
Contribute to investigations, threat hunting, and incident response activities in a supporting role.
Collaborate with the monitoring and response team to create playbooks for specific incident response scenarios related to the products and services you oversee. These investigations, incidents, and playbooks may address security, fraud, privacy, resilience, and related concerns.
Support the security operations team with the vulnerability management lifecycle for products and services under your purview.
Ensure technical alignment for the products and services you oversee with team initiatives, including GRC, security operations, and monitoring and response activities.
Required Skills, Knowledge & Abilities
Strong communicator with the ability to lead technical architecture discussions, drive technical decisions, and effectively communicate with non-technical audiences.
Expertise in agile product lifecycles. Ideally, you have experience in a product manager or engineering manager role and understand how SaaS products (B2B, B2B2C, and B2C) are built, including roadmap planning and feature and defect prioritization.
Experience with threat modeling methodologies, with the ability to create efficient and scalable approaches to conducting such assessments.
Familiarity with AWS services, including KMS, SST, Container Registry, ELBs, Lambda, API Gateway, CloudTrail, and IAM (knowledge of GCP and/or Azure is a plus).
Proven ability to establish credibility and build trust with business, engineers, and operational staff; confident yet humble.
Hands-on experience with managing security for core enterprise systems, e.g., ERP, HCM, Salesforce, etc.
Strong understanding of both human and non-human identity management and common enterprise and consumer authentication standards and use cases.
Practical experience with CI/CD pipelines and DevOps tools, including Infrastructure-as-Code (IaC) tools like Terraform, Pulumi, or CDK; GitHub and GitHub Actions; artifact management; and secrets management tools like Doppler and HashiCorp Vault.
Passionate about learning new technologies. While you're not expected to know everything, you should demonstrate a willingness and ability to learn as needed.
Prior experience interfacing and supporting with G&A teams, internal product teams, and other cross-functional areas.
Proficiency in writing automation scripts in multiple languages, with prior experience automating security processes in cloud or SaaS environments.
Experience engaging with vendors in design partnerships.
Experience overseeing vulnerability and threat management at the platform and application levels.
Familiarity with penetration testing and red team exercises, including manual verification, exploitation, and lateral movement.
Ability to balance a high-level view of security strategy with attention to detail, ensuring thorough and effective execution.
In addition to the above salary, this role may be eligible for a bonus. Additional Information Regarding Job Duties and s:
Job duties include additional responsibilities as assigned by one's supervisor or other managers related to the position/department. This job description is meant to describe the general nature and level of work being performed; it is not intended to be construed as an exhaustive list of all responsibilities, duties and other skills required for the position. The Company reserves the right at any time with or without notice to alter or change job responsibilities, reassign or transfer job position or assign additional job responsibilities, subject to applicable law. The Company shall provide reasonable accommodations of known disabilities to enable a qualified applicant or employee to apply for employment, perform the essential functions of the job, or enjoy the benefits and privileges of employment as required by the law.
If you are an extraordinary professional who thrives in a collaborative work culture and values a rewarding career, then we want to work with you! Apply today!
We are committed to protecting your privacy. To learn more about how we collect, use, and safeguard your personal information during the application process, please review our Employment Privacy Policy and Recruiting Policy on AI.
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.