Post job

Security engineer jobs in Oceanside, CA

- 314 jobs
All
Security Engineer
Information Security Analyst
Cyber Security Analyst
Security System Engineer
Senior Security Engineer
Network Security Analyst
Senior Cyber Security Analyst
Senior Security Analyst
Information Systems Security Officer
  • Security Engineer

    Balance Staffing Company 4.2company rating

    Security engineer job in Irvine, CA

    At Balance Staffing, we're obsessed with your success! The Workstation Security Engineer I is an individual contributor who will participate in and manage all aspects of information and network security, including intrusion detection, incident response, vulnerability assessment, application security, and compliance with the corporate information security policy for all Client Device endpoints. This person Will primarily be responsible for designing, implementing, administrating, operating, and improving security technologies, including but not limited to Client device endpoints, Azure Microsoft Defender, Al Security tools, Network Access Control, End Point Protection, Two Factor Authentication, and their procedures and processes. ESSENTIAL FUNCTIONS Workstations Security Engineering - Design, build, test and deploy new security technologies, which include the development of the operational manual and run books Provides technical security operations engineering services to support and update existing security systems and works to automate processes related to security implementations, monitoring, and enforcement Investigates, recommends, evaluates, deploys and integrates operational security tools and techniques to improve our ability to protect corporate assets and infrastructure Participate in technical risk assessments and security exposure analyses of systems, networks and business applications Analyzes network security elements and overall network security architectural designs to ensure secure and optimal system and network performance and cost effectiveness Responsible for conducting vulnerability assessments and penetration testing, analyzing vulnerability data and prioritizing remediation efforts, and developing vulnerability policies and procedures with the collaboration of GRC. Oversees the installation, configuration, and supportive processes of security technologies Participate in or lead the Incident Response activities Interacts With internal and external clients on security operations requirements, identifies security process and develops strategies/solutions to security issues Keeps fully abreast of trends and changing technologies as they relate to IT and Network Engineering and Information Security fields Lead or assist in periodic or ad-hoc security reports that provide relevant situational awareness to our senior stakeholders Security Operations / Administration - Monitor and manage our networks and infrastructure environment for attacks, malicious software, and possible intrusions, which includes the follow-up of complete remediation of infected systems Implement changes to our security technologies/infrastructure in accordance with standard and change control policies/procedures Evaluate, implement, tune, and operate security solutions such as IPS, Vulnerability scanning tools, encryption capabilities, etc Monitor and recommend improvements of security technologies and their various reports Risk Management / Security Audit/Assessment Support / Ad-hoc support - Support security audit/assessment related activities and compliance reviews Performs other tasks, duties and projects as assigned Provide Ad-hoc support as required REQUIREMENTS Bachelor's Degree in Computer Science, Information Systems or related field, or equivalent experience Minimum 3 years of IT relevant experience or equivalent combination of experience plus at least 1 year of experience performing Security Engineering / Planning / Operations Experience in medium to complex computing environments, with advanced knowledge in security technologies and services Hands-on experience with at least two or more of the following Enterprise Security Technologies: Network Intrusion Prevention / Detection Virtual private Networks; SSL, IPSec and Site-to-Site Enterprise Class Stateful Inspection Firewalls Network Access Controls in context to Identity management Windows server OS & Desktop OS Network Packet Inspection Directory Services including LDAP, AD and Secure Authentication Technologies Experience in implementing Information Security technologies and/or processes required. Experience in defining Information Security strategies and frameworks Experience integrating security technologies into corporate operations frameworks. Ability to communicate effectively with client staff at all levels, from technical to executive Multi-task oriented in a team environment Demonstrated ability to pay close attention to detail Knowledge of Information security risk assessment methodologies and standards Experience developing technical documentation, including reports, proposals, statements of work, and whitepapers Ability to work independently, undertaking and completing project tasks on schedule with minimal supervision Balance Staffing is proud to be an equal-opportunity workplace. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity, Veteran status, or any other characteristic protected by federal or state law.
    $86k-119k yearly est. 1d ago
  • Staff Product Security Engineer (SSDL)

    Servicenow 4.7company rating

    Security engineer job in San Diego, CA

    It all started in sunny San Diego, California in 2004 when a visionary engineer, Fred Luddy, saw the potential to transform how we work. Fast forward to today - ServiceNow stands as a global market leader, bringing innovative AI-enhanced technology to over 8,100 customers, including 85% of the Fortune 500 . Our intelligent cloud-based platform seamlessly connects people, systems, and processes to empower organizations to find smarter, faster, and better ways to work. But this is just the beginning of our journey. Join us as we pursue our purpose to make the world work better for everyone. Job Description **PLEASE NOTE**: This role requires a minimum of 2 days per week in our San Diego, CA ServiceNow Office. Please do not apply if you cannot meet this requirement. Thank you The ServiceNow Security Organization (SSO): The ServiceNow Security Organization (SSO) delivers world-class, innovative security solutions to reduce risk and protect the company and our customers. We enable our customers to migrate their most sensitive data and workloads to the cloud, accelerating our business so that we are the most trusted SaaS provider. We create an environment where our employees are proud to work and can make a positive impact Team: Product Security is Shifting Everywhere and holistically improving the maturity of the security program. The Secure Software Development Lifecycle (SSDL) team helps the organization measure and improve security activities. The team leads product threat modeling, helps to improve security behaviors, and manages a highly visible security champions program. The team is both highly technical and strategic. Role: As a Staff Product Security Engineer on the ServiceNow SSDL team, you will collaborate with developers and software architects on highly technical solutions and help the organization build secure and resilient software. You will be threat modeling software products and services to identify potential risk and participate in architectural reviews of products in development. A key part of this position is to ensure the continued success of a large and growing security champions program. You will help mentor security champions and assist them in secure software design. As a Staff Product Security Engineer, you will help security champions be successful. What you get to do in this role: Work on a wide range of technologies Work on complex architectural and technical challenges Participate in threat modeling activities Mentor and collaborate with development teams to adopt secure coding practices Work on strategic and highly visible security activities across the organization Be an advocate for security and participate in a security champions program Qualifications To be successful in this role, we need someone who has: Experience in leveraging or critically thinking about how to integrate AI into work processes, decision-making, or problem-solving. This may include using AI-powered tools, automating workflows, analyzing AI-driven insights, or exploring AI's potential impact on the function or industry. 2+ years of experience in software development 8+ years of experience in software security (AppSec) 2+ years of experience in threat modeling software applications and services Proficient in threat modeling methodologies such as STRIDE or PASTA and their applied use in fast-moving, iterative development lifecycles In-depth knowledge of common web application vulnerabilities (OWASP Top 10) Developer-level proficiency in one or more languages - Python, Java, JavaScript, and Golang preferred Working knowledge of Machine Learning and taxonomies such as BIML that categorize known attacks on machine learning models In-depth knowledge of software design patterns and their security considerations In-depth knowledge of authentication and authorization standards including OAuth, OIDC, SAML, JWT, and PASETO Knowledge of symmetric and asymmetric cryptography, digital signatures, PKI, TLS, and cryptographic hash functions Knowledge of cloud native technologies including containers, Kubernetes, and services provided by AWS, GCP, and Azure Knowledge of static analysis (SAST), dynamic analysis (DAST), and software composition analysis (SCA) security tools Knowledge of OWASP ASVS, SCVS, and related verification standards Ability to work collaboratively in a highly distributed team Ability to communicate technical concepts to business stakeholders A passion for security #SecurityJobs For positions in this location, we offer a base pay of: $155,800 to $272,700 plus equity (when applicable), variable/incentive compensation and benefits. Sales positions generally offer a competitive On Target Earnings (OTE) incentive compensation structure. Please note that the base pay shown is a guideline, and individual total compensation will vary based on factors such as qualifications, skill level, competencies, and work location. We also offer health plans, including flexible spending accounts, a 401(k) Plan with company match, ESPP, matching donations, a flexible time away plan and family leave programs. Compensation is based on the geographic location in which the role is located and is subject to change based on work location. Additional Information Work Personas We approach our distributed world of work with flexibility and trust. Work personas (flexible, remote, or required in office) are categories that are assigned to ServiceNow employees depending on the nature of their work and their assigned work location. Learn more here. To determine eligibility for a work persona, ServiceNow may confirm the distance between your primary residence and the closest ServiceNow office using a third-party service. Equal Opportunity Employer ServiceNow is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, creed, religion, sex, sexual orientation, national origin or nationality, ancestry, age, disability, gender identity or expression, marital status, veteran status, or any other category protected by law. In addition, all qualified applicants with arrest or conviction records will be considered for employment in accordance with legal requirements. Accommodations We strive to create an accessible and inclusive experience for all candidates. If you require a reasonable accommodation to complete any part of the application process, or are unable to use this online application and need an alternative method to apply, please contact [email protected] for assistance. Export Control Regulations For positions requiring access to controlled technology subject to export control regulations, including the U.S. Export Administration Regulations (EAR), ServiceNow may be required to obtain export control approval from government authorities for certain individuals. All employment is contingent upon ServiceNow obtaining any export license or other approval that may be required by relevant export control authorities. From Fortune. ©2025 Fortune Media IP Limited. All rights reserved. Used under license.
    $155.8k-272.7k yearly 12d ago
  • Cyber security Operations Analyst

    Military, Veterans and Diverse Job Seekers

    Security engineer job in San Diego, CA

    Duties and Responsibilities Maintain and operate cybersecurity technology and and provide expertise in area of focus (e.g. Risk Assessments, Controls Engineering or Incident Response). Collaborates with the business to understand their needs in order to tailor security offerings unique to their environment. Uses working knowledge of IT system functionality, architecture and capabilities to effectively diagnose and troubleshoot issues with some assistance. Conducts competitive analyses on (in-use and alternative) cyber technologies and documents recommendations for our environment. Provides awareness and guidance within Sempra Infrastructure community on secure business processes, architecture design, and technical controls. Maintains awareness of evolving cybersecurity threats and best practices for mitigation. Develops procedures and guidelines for implementing information security systems and practices. Develops and aggregates metrics to measure, monitor and report on the effectiveness of information security controls and compliance with information security policies. Performs other duties as assigned (no more than 5% of duties). Education Bachelor's degree in Computer Science or other science or technology major or equivalent experience required. Experience Minimum of 2-5 years of direct experience within the information security field required. In-depth experience in at least one cybersecurity discipline required. Experience with projects of moderately sized security related initiatives to successful completion required. Demonstrated experience in vendor selection, testing, implementation, and operations of a broad array of security technologies required. Knowledge, Skills and Abilities Familiarization with Endpoint protection software such as Trellix and Microsoft Defender. Familiarization in deploying vulnerability management agents. Experience deploying logging agents and configurations. Knowledge of firewalls and security zone. Experience working in an Operation Technology (OT), ICS / SCADA environment. Experience with SCADA network protocols. Experience with OT network monitoring tools (such as but not limited to: Dragos, Cybervision, CyberX). Ability to take initiative and work independently when needed. Ability to maintain, upgrade and recommend operational cybersecurity tools. Ability to work with Cybersecurity OT Engineering to make recommendations for new tools and capabilities. Ability to work effectively on multiple projects within a team structure and excellent written and oral communication skills. Licenses and Certifications Certified Information Systems Security Professional (CISSP) certification, Global Information Security Professional (GISP) certification, Global Information Assurance Certification (GIAC), Certified Information Systems Auditor (CISA), or Certified Internal Auditor (CIA) certificate preferred. Targeted professional cybersecurity certifications (i.e. forensics and incident response) preferred. Other Qualifications Bilingual in English/Spanish preferred.
    $80k-112k yearly est. 60d+ ago
  • Platform Security Engineer

    Saronic

    Security engineer job in San Diego, CA

    Saronic Technologies is a leader in revolutionizing defense autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations for the Department of Defense (DoD) through autonomous and intelligent platforms. Saronic Technologies is a leader in defense autonomy at sea. We're seeking a Platform Security Engineer to secure the cloud/edge where vessels, operators, and customers meet. You'll own identity and access patterns, secrets and key management, secure network posture, and policy-as-code guardrails-working across AWS (including GovCloud), Terraform infrastructure, and service code to deliver trustworthy, auditable systems. Senior Engineers: 3+ years securing production cloud platforms (identity, secrets/KMS, network posture), preferably in autonomy, robotics, aerospace, or defense. Staff Engineers: 8+ years including technical leadership across secure-by-default platform modules, short-lived credential issuance, and cross-account policy design; demonstrated ownership from design through operational rollout.Key Responsibilities Design, develop, and maintain secure-by-default infrastructure on AWS using Terraform (ALB/OIDC, IAM, KMS, Secrets Manager, Route53, VPC/SGs). Standardize OIDC at the edge (ALB/ingress) for internal and external applications; define scopes, claims, and token lifecycles. Own secrets and key management: KMS key policies, rotation schedules, cross-account access, and automated issuance for services and tools. Enforce IMDSv2 required, least-privilege IAM roles, and tight security groups across modules; add CI/policy checks to prevent regressions. Design secure protocols/APIs for service↔service and boat↔cloud communication (mTLS/TLS, certificate issuance/rotation, revocation). Manage short-lived credentials used by fleet/overlay services; implement rotation, auditing, and incident response runbooks. Prefer service-mediated S3 access over broad pre-signed URLs; codify bucket policies, logging, and access boundaries. Build centralized, tamper-evident logging and audit trails; integrate detections and metrics to validate control effectiveness. Perform threat modeling and security reviews; document patterns and drive adoption via reusable modules and guides. Troubleshoot complex security issues in production; lead post-incident reviews and drive remediation to closure. Stay current on cloud security best practices, especially for defense/government environments. Required Qualifications: Bachelor's or Master's degree in Computer Science, Software/Computer/Electrical Engineering, or a related field. 3+ years building on AWS with Terraform (ALB/ELB, IAM, KMS, Secrets Manager, Route53, VPC/SGs). Strong knowledge of cryptographic and IAM fundamentals (key policies, rotation, certificates, OIDC/OAuth2). Demonstrated experience enforcing IMDSv2, least-privilege roles, and network controls at scale. Experience designing secure protocols/APIs and integrating auth into service code (e.g., Go/Rust/TypeScript). Proven ability to perform threat modeling and conduct design/code security reviews. Excellent problem-solving and communication skills; effective collaboration across platform, embedded, and field teams. This role requires the ability to obtain and maintain a security clearance Preferred Qualifications: Experience in AWS GovCloud, multi-account landing zones, and cross-account KMS/Secrets patterns Familiarity with fleet/overlay VPN access control and short-lived credential issuance Policy-as-code guardrails (e.g., OPA/Conftest, Terraform validations), drift detection, and CI integration Centralized logging/SIEM and cloud threat detection (e.g., CloudTrail, GuardDuty) with audit readiness PKI/CA management and, ideally, hardware roots of trust (TPM/secure elements) at the edge DoD/defense domain familiarity and prior work under export-controlled constraints Benefits:Medical Insurance: Comprehensive health insurance plans covering a range of services Saronic pays 100% of the premium for employees and 80% for dependents Dental and Vision Insurance: Coverage for routine dental check-ups, orthodontics, and vision care Saronic pays 100% of the premium under the basic plan for employees and 80% for dependents Time Off: Generous PTO and HolidaysParental Leave: Paid maternity and paternity leave to support new parents Competitive Salary: Industry-standard salaries with opportunities for performance-based bonuses Retirement Plan: 401(k) plan Stock Options: Equity options to give employees a stake in the company's success Life and Disability Insurance: Basic life insurance and short- and long-term disability coverage Pet Insurance: Discounted pet insurance options including 24/7 Telehealth helpline Additional Perks: Free lunch benefit and unlimited free drinks and snacks in the office This role requires access to export-controlled information or items that require “U.S. Person” status. As defined by U.S. law, individuals who are any one of the following are considered to be a “U.S. Person”: (1) U.S. citizens, (2) legal permanent residents (a.k.a. green card holders), and (3) certain protected classes of asylees and refugees, as defined in 8 U.S.C. 1324b(a)(3) . Saronic does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.
    $101k-144k yearly est. Auto-Apply 35d ago
  • Network Security Analyst I

    Select Cyber

    Security engineer job in San Diego, CA

    Select Cyber, an Information Security recruitment specialty firm, seeks to fill the following role for our client: Network Security Analyst I Be part of a cutting-edge Computer Incident Response Team, (CIRT) for a fortune 500 company. We are looking for individuals that want to learn a new field and grow with the company. Training provided. The selected candidate will be a part of the Security Operations Center (SOC) and its mission to improve the information security of our customers using a Security Information and Event Management (SIEM) tool to detect and analyze IT security incidents. Responsibilities: Perform the following functions as individual assignments or as part of a team: · Monitoring client networks for signs of adversarial activity. · Respond to alerts from various monitoring systems and platforms providing indicators for enterprise defensive measures. · Analyze reports to understand threat campaign(s) techniques, lateral movements and extract indicators of compromise (IOCs). · Triage potentially malicious events to determine severity and criticality of the event. · Follow procedures to analyze and escalate security incidents which vary from customer to customer. Experience · 1+ years technical experience in the Information Technology field. · Experience with Intrusion Detection & Prevention Systems (IDS/IPS) or Firewalls & Log Analysis a plus. · Technical degree, Associate or Bachelor's degree from an accredited institution in Computer Science or information technology field preferred. · CompTIA Network+/Security+ certifications is a plus
    $77k-105k yearly est. 60d+ ago
  • Cyber Security Analyst

    Orange County Dept. of Education 4.1company rating

    Security engineer job in Costa Mesa, CA

    The Orange County Department of Education (OCDE) serves some of Orange County's most vulnerable student populations and provides support and mandated fiscal oversight to 28 school districts serving more than 600 schools and approximately 475,000 students. In addition to providing direct instruction to students through its own alternative and special education programs, OCDE administers an array of programs and services that are critical to the operations of local school districts and community colleges, facilitating professional development, legal guidance, payroll, career and technical education support, high-speed internet access, Local Control and Accountability Plan assistance and approval, resources for families, and student enrichment. OCDE's vision is that "Orange County students will lead the nation in college and career readiness and success." Department staff are working to achieve this goal in collaboration with educators at all levels of student development, from early childhood through higher education, and in partnership with families, businesses and community organizations. See attachment on original job posting Education and Experience: Any combination of education and experience that would likely provide the required knowledge and abilities is qualifying. A typical way to obtain the knowledge and abilities would be: • Bachelor's degree or equivalent from an accredited college or university with major course work in information security, or a related field. • One to two years of experience in information security technology, specifically with penetration testing, intrusion detection, incident response, or digital forensics; or an equivalent combination of training and experience. There are supplemental questions in the application. Please note that the EdJoin system will time-out after a 20-minute period of perceived inactivity. To assist you in the preparation of your application, the supplemental questions are listed here. Your responses should be thoughtful and thorough, and within the limit of 5,000 characters or less. We recommend that you prepare your responses in advance of beginning the application. 1. Explain a cybersecurity framework or methodology you know and how you have applied it in a previous role or project. 2. Describe your approach to investigating and assessing cybersecurity events and incidents. How do you prioritize incidents, and what criteria do you use to determine severity and impact? 3. Why are you passionate about pursuing a career in cybersecurity, and how do you stay current with the latest trends and developments in the field? Notice to Applicants: If you require accommodations in the application process, please inform us. Education and Experience: Any combination of education and experience that would likely provide the required knowledge and abilities is qualifying. A typical way to obtain the knowledge and abilities would be: • Bachelor's degree or equivalent from an accredited college or university with major course work in information security, or a related field. • One to two years of experience in information security technology, specifically with penetration testing, intrusion detection, incident response, or digital forensics; or an equivalent combination of training and experience. There are supplemental questions in the application. Please note that the EdJoin system will time-out after a 20-minute period of perceived inactivity. To assist you in the preparation of your application, the supplemental questions are listed here. Your responses should be thoughtful and thorough, and within the limit of 5,000 characters or less. We recommend that you prepare your responses in advance of beginning the application. 1. Explain a cybersecurity framework or methodology you know and how you have applied it in a previous role or project. 2. Describe your approach to investigating and assessing cybersecurity events and incidents. How do you prioritize incidents, and what criteria do you use to determine severity and impact? 3. Why are you passionate about pursuing a career in cybersecurity, and how do you stay current with the latest trends and developments in the field? Notice to Applicants: If you require accommodations in the application process, please inform us. Comments and Other Information Resumes will not be accepted in lieu of the completed online application. Before receiving authorization to work in this position, the individual selected will be required to provide a current negative TB authorization, within the last 60 days, and submit fingerprints for the purpose of conducting a confidential background investigation and record check. The tests are arranged and paid for by OCDE. The Immigration Reform and Control Act of 1986 requires employers to verify the employability of all new employees. Before the Department will finalize an offer of employment, the candidate selected will be required to show original documents which establish both the individual's identity and employment authorization. The candidate must also sign a statement under penalty of perjury regarding his/her employability. We reserve the right to reopen, readvertise, or delay filling this position. AA/EOE/ADA
    $69k-102k yearly est. 40d ago
  • Senior Security Operations Analyst

    Revelyst

    Security engineer job in Irvine, CA

    As a Senior Security Operations Analyst, you will be a key member of our Security Operations team, responsible for detecting, investigating, and responding to cyber threats across our enterprise. You will help build and mature our SOC (Security Operations Center) capabilities, contribute to threat intelligence and incident response, and play a critical role in securing our e-commerce platforms, customer data, and connected product ecosystem. This role requires a balance of hands-on technical expertise, analytical thinking, and the ability to communicate risk and remediation clearly to both technical and business stakeholders. **Key Responsibilities** Security Monitoring & Detection · Lead monitoring of security events across SIEM, EDR, cloud, and network security platforms. · Analyze alerts, correlate data, and distinguish between true positives, false positives, and emerging threats. · Develop, tune, and improve detection use cases, rules, and automation playbooks. Incident Response & Forensics · Serve as a first responder and subject matter expert for security incidents, leading investigations and containment activities. · Conduct forensic analysis on endpoints, cloud environments, and applications when necessary. · Collaborate with IT, cloud, and DevOps teams to ensure rapid remediation and recovery. Threat Intelligence & Hunting · Perform proactive threat hunting activities to identify hidden risks or advanced persistent threats. · Leverage external threat intelligence to enrich investigations and improve defensive measures. · Stay current with evolving attack techniques, malware trends, and vulnerabilities relevant to retail, e-commerce, and IoT/connected devices. Governance, Risk, and Compliance (Support) · Support compliance initiatives (PCI-DSS, SOC2, ISO 27001, GDPR, CCPA, NIST etc.) by ensuring security controls are effective. · Provide input into risk assessments and partner with vulnerability management to prioritize patching. Collaboration & Continuous Improvement · Partner with IT, Product, e-commerce, and retail technology teams to secure new business initiatives. · Mentor junior analysts and contribute to knowledge-sharing across the team. · Recommend and implement process improvements, automation, and best practices. **Qualifications** Required Skills & Experience · 5+ years in a security operations or incident response role, with experience in enterprise-scale environments. · Strong knowledge of SIEM, EDR, MDR, firewalls, and cloud-native security tools (AWS/GCP/Azure). · Hands-on experience with incident handling, digital forensics, and malware analysis. · Familiarity with MITRE ATT&CK, cyber kill chain, and common threat actor tactics. · Proficiency in scripting (Python, PowerShell, or similar) to automate investigations or workflows. · Excellent communication skills, with the ability to explain technical risks to non-technical stakeholders. Preferred Skills · Experience in retail, e-commerce, or IoT/connected device security. · Experience in key principles of incident response & security operations. · Experience in MDR & SIEM solutions · retail, e-commerce, or IoT/connected device security. · Exposure to PCI-DSS or other retail payment security frameworks. · Knowledge of container security (Kubernetes, Docker) and DevSecOps practices. · Relevant certifications: GCIA, GCIH, GCFA, CEH, OSCP, or CISSP. **Pay Range:** $112,200.00 - $148,500.00 The actual annual salary offered to a candidate will be based on variables including experience, geographic location, education, and skills/achievements, and will be mutually agreed upon at the time of offer. We offer a highly competitive salary, comprehensive benefits including: medical and dental, vision, disability and life insurance, 401K, PTO, paid holidays, gear discounts and the ability to add value to an exciting mission! Our Postings are not intended for distribution to or use in any jurisdiction, country or territory where such distribution or use would violate local law or would subject us to any regulations in another jurisdiction, country or territory. We reserve the right to limit our Postings in any jurisdiction, country or territory. Equal Opportunity Employer Minorities/Females/Protected Veteran/Disabled **Revelyst is a collective of makers that design and manufacture performance gear and precision technologies. Our category-defining brands leverage meticulous craftsmanship and cross-collaboration to pursue new innovations that redefine what is humanly possible in the outdoors. Portfolio brands include Foresight Sports, Bushnell Golf, Fox, Bell, Giro, CamelBak, Bushnell, Simms Fishing and more.** Revelyst is an equal opportunity employer. All applicants are considered for employment without regard race, color, religion, sexual orientation, gender identity, national origin, disability, veteran status, and any other characteristics protected by law. The EEO Law poster is available here: **************************************************************** If you need a reasonable accommodation because of a disability for any part of the employment process, please send an e-mail to ******************** . Please note that this email address is for accommodation purposes only. Revelyst will not respond to inquiries for other purposes.
    $112.2k-148.5k yearly 44d ago
  • Senior Cyber Security Operations Analyst

    Loandepot 4.7company rating

    Security engineer job in Irvine, CA

    at loan Depot loan Depot's Security Operations team is at the forefront of cyber defense for the organization. We are seeking a Senior Security Analyst who will act as both a technical authority and front-line commander within our Security Operations Center. This is a strategic, high-impact role for a seasoned professional who can seamlessly integrate with our team on Day One, bringing the composure, knowledge, experience, and precision necessary to contain and eradicate cyber threats from our environment.Reporting directly to the Information Security Operations Manager, this position partners closely with our Level 1 MSSP, internal business units, and external incident response partners to ensure that every incident is managed with accountability, consistency, and efficiency. The ideal candidate is resourceful, quick-thinking, and deeply fluent with the leading security stacks and tools, capable of turning strands of data into decisive action and information. The Sr. Cyber SOC Analyst must be able to come into the Irvine, CA office 2-3 times per week. Responsibilities: Lead and execute end-to-end security incident response activities including detection and triage, containment, eradication, and recovery for incidents ranging from simple to complex. Serve as incident commander for high-severity security events, ensuring clear communication and timely resolution across stakeholders. Partner with Level 1 MSSP partners to validate escalations, refine detection logic, and ensure consistent handling workflows. Coordinate with external partners and internal teams to contain and mitigate threats while maintaining operational resilience. Detection, Analysis, & Threat Hunting Utilize industry standard and/or custom tools for telemetry to conduct deep-dive investigations and root cause analysis. Develop and optimize queries, analytic rules, and playbooks to enhance threat detection and automation, pushing incidents towards level 0 where possible. Conduct proactive threat hunts and adversary emulation exercises to identify emerging tactics, techniques, and procedures (TTPs) before they escalate into incidents. Leverage MITRE ATT&CK, NIST SP800-61r3, NIST CSF2, and other frameworks to ensure methodical and repeatable investigation practices. Operational Excellence & Leadership Document and refine incident response playbooks and runbooks to improve team consistency and speed. Produce detailed incident reports, post-incident reviews, and executive summaries with actionable insights. Mentor other analysts and emerging prospects, reinforcing our culture of accountability, consistency, and efficiency. Participate in weekly high-severity incident case reviews and contribute to the continuous improvement of SOC metrics and performance. Other duties as assigned. Requirements: Bachelor's Degree in a related field preferred, but not required. Minimum of five (5) + years' experience working in a security operations center or similar environment preferred. A demonstrated mastery of industry leading tools in SIEM, EDR, and CSPM. Expertise in querying, hunting, and correlating disparate data points across large telemetry datasets using SQL/KQL/Cypher. A demonstrated ability to lead complex investigations and coordinate across technical and business stakeholders. A solid understanding of cybersecurity frameworks such as MITRE ATT&CK, NIST CSF 2, NIST SP800-61r3. Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant narratives. Experience in log aggregation technologies and SIEM tuning processes. Experience in the Mortgage industry preferred. CISSP, GIAC Certified Incident Handler, or other related certifications preferred. Why work for #teamloan Depot: Competitive compensation based on skillset and relatable experience. Work with other passionate, purposeful, and customer-centric team members. Inclusive, diverse, and collaborative culture where people from all backgrounds can thrive. Extensive internal growth and professional development opportunities including tuition reimbursement. Comprehensive benefits package including Medical/Dental/Vision. Wellness program to support both mental and physical health. Discretionary Time Off (DTO) policy to support work-life balance in addition to Paid Voluntary Time Off. About loan Depot: loan Depot (NYSE: LDI) is a digital commerce company committed to serving its customers throughout the home ownership journey. Since its launch in 2010, loan Depot has revolutionized the mortgage industry with a digital-first approach that makes it easier, faster, and less stressful to purchase or refinance a home. Today, loan Depot enables customers to achieve the American dream of homeownership through a broad suite of lending and real estate services that simplify one of life's most complex transactions. With headquarters in Southern California and offices nationwide, loan Depot is committed to serving the communities in which its team lives and works through a variety of local, regional, and national philanthropic efforts. Base pay is one part of our total compensation package and is determined within a range. This provides the opportunity to progress as you grow and develop within a role. The base pay for this roles is between $99,000 and $136,000. Your base pay will depend on multiple individualized factors, including your job-related knowledge/skills, qualifications, experience, and market location. We are an equal opportunity employer and value diversity in our company. We do not discriminate based on race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
    $99k-136k yearly Auto-Apply 31d ago
  • Cyber Security Analyst (MSSP/SOC)

    Agile It

    Security engineer job in San Diego, CA

    Hey there, Rockstar! 🚀 We are looking for you! At Agile IT, we help organizations thrive by making technology simple, secure, and strategic. As a trusted Microsoft partner and CMMC Registered Practitioner Organization (RPO), we specialize in guiding businesses through the complexities of cloud adoption, cybersecurity, and compliance, so they can focus on achieving their mission without being slowed down by IT challenges. We combine deep technical expertise with a people-first approach to deliver solutions that actually work in the real world. From CMMC compliance and security to cloud migration, collaboration, and ongoing managed services, Agile IT empowers organizations to modernize with confidence and agility. Why Work at Agile IT? Impactful Work: Everything you touch helps to keep our nation's secrets secure while also helping our client organizations thrive, making technology a true enabler instead of a roadblock. Culture of Growth: We're a team of curious learners and problem-solvers, and we invest in developing your expertise through training, certifications, and hands-on experience. Flexibility & Balance: With a remote-friendly environment and a people-first approach, you get the freedom to do your best work while living your best life. Collaborative Team: At Agile IT, you're surrounded by passionate professionals who support one another and celebrate success together. Forward-Thinking Mindset: We stay ahead of industry shifts so our team and our clients are always future-ready. Joining Agile IT means being part of a company that isn't just adapting to the future of IT-it's shaping it. Job Description At Agile IT, supporting CMMC-compliant environments means we don't just fix problems-we prevent them. As a Security Analyst at Agile IT, you'll play a critical role in safeguarding our clients. You'll monitor and analyze security events, investigate incidents, and collaborate with senior engineers and architects to deliver world-class managed security services. This is an excellent platform to sharpen your analytical and technical skills while protecting clients in today's ever-changing threat landscape. This position is designed to nurture your career growth, providing a pathway into the dynamic and evolving field of cybersecurity operations and defense. What you do: (major responsibilities) Monitor and analyze security events across client environments. Investigate alerts, perform triage, and escalate incidents when needed. Conduct threat analysis and provide actionable recommendations to reduce risk. Assist in incident response activities, including root cause analysis and reporting. Tune and improve detection rules and security use cases to enhance visibility. Communicate findings clearly to both technical and non-technical stakeholders. Stay up to date on emerging threats, vulnerabilities, and trends. Qualifications What sets you apart: (qualifications-knowledge, skills, and abilities) 2+ years of experience in a SOC/NOC or MSSP in cybersecurity; OR 5+ years of experience in cybersecurity operations role. Familiarity with SIEM tools (Sentinel, Splunk, QRadar, etc.). Strong understanding of networking, firewalls, IDS/IPS, and endpoint protection. Knowledge of security frameworks such as MITRE ATT&CK, NIST, or CIS Controls. Excellent problem-solving and communication skills. A collaborative mindset with the ability to work across teams and with customers. Nice to have skills: (preferred skills or skills that will be expected to learn) Certifications such as SC-200, Network+, Security+, CySA+, CEH, CISSP, or equivalent. Experience with Microsoft Security tools (Defender, Sentinel, Purview, Entra). Exposure to cloud platforms (Microsoft Azure, AWS, Google Cloud). Familiarity with compliance frameworks (CMMC, NIST 800-171, HIPAA, ISO 27001). Additional Information A writing sample will be requested from candidates who are chosen to move forward in the interview process. THE FINE PRINT: Compensation and Benefits *Pay range is $62,400 to $83,200 per year. Starting pay is generally lower to mid-range; based on experience. This is a remote, full-time, non-exempt position. Medical/Dental/Vision/STD/LTD Remote mental and physical health networks $200,000 basic life insurance Voluntary life 401(k) with 3% employer contribution - no vesting period Combined 18 days PTO increasing with tenure 9 paid holidays And so much more *Factors in determining the appropriate compensation for a role include experience, skills, knowledge, abilities, education, licensure and certifications, and other business and organizational needs. The Hiring Pay Scale referenced in the job posting is the budgeted salary or hourly range that Agile IT reasonably expects to pay for this position. Background checks, pre-employment aptitude, and skills testing are a mandatory part of the recruitment process. All Agile IT employees are provided with laptops and home office equipment. Due to the contractual requirements of our work with government entities, all hires must be US Citizens. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. All your information will be kept confidential according to EEO guidelines.
    $62.4k-83.2k yearly 60d+ ago
  • Systems Security Engineer II

    Cambro Manufacturing 4.4company rating

    Security engineer job in Huntington Beach, CA

    The System Security Engineer Level II is required to be a highly skilled and hands-on security engineer, and will be responsible for helping to maintain and expand the infrastructure of the entire Cambro network, ensuring that they are protected from cyber threats and attacks, ensuring compliance, and responding to incidents. In this role, the responsibility is to manage, monitor, and maintain our Network IT infrastructure from CVEs, cyber threats, manage and implement device firmware and software updates. Also, the role is required to assist in projects and initiatives to support, upgrade, and maintain our technical environment to improve network security. The role requirement is to be proficient with cybersecurity frameworks including NIS, ISO27001/27002, CIS, HIPAA, CCPA/CPRA and GDPR. The role requires to have a multi-disciplined background including experience with Cybersecurity Operations, firewalls, IDS/IPS, switches, VLANs, routing protocols, IPsec, VPN tunnels, multi factor authentication and e-mail security. In addition, they must have a solid understanding of virtualized servers, Windows workstations and services. This role is required to have the network monitoring skills and technologies for detecting unusual activity, investigate security breaches and lead incidence response. ESSENTIAL JOB FUNCTIONS • Monitor network traffic for anomalies, investigate alerts and respond to security incidents. • Conduct regular vulnerability scans, risk assessments, patch management and mitigation across network devices. • Ensure adherence to cybersecurity frameworks including NIS, ISO27001/27002, CIS, HIPAA, CCPA/CPRA and GDPR. • Able to proactively scan servers and network devices for vulnerable ports and protocols and rogue devices. • Manage our firewall environment with the ability to create route policies and apply cybersecurity recommendations • Install and configure Network Equipment (Switches, Firewalls, and other networking hardware) • Perform (Layer 2) switch administration and configuration on Cisco/Ruckus switches. Including configuring LAGs, interfaces, creating trunks, creating, and managing segmented VLANs. • Possess a solid understanding of Windows Server services and roles including installation and configuration • Create certificates for network devices and servers that have a web management capability • A strong understanding of Windows Active Directory and can design, implement, and configure and troubleshoot Active Directory issues • Create, Manage and Deploy Group Policy Objects (GPO's) to deploy applications and implement security including windows firewalls • Effectively use PowerShell to automate and standardize administrative tasks • Capable of installing a Linux VM and execute basic Linux commands and managing Linux appliances • Manage our virtualized server environment managing, creating VM's and patching the VMware environment. • Strong understanding of Virtual Switches, Port Groups (Distributed and Standard) • Manage the Active Backup for Business on Synology and other advanced Synology administration features • Maintain and monitor Backup solutions. • Manage our users email accounts using the cloud service M365 from Microsoft • Responsible for creating and maintaining server and network documentation to include tasks and procedures • Proactively monitor our network using a variety of tools to help identify potential network and server issues • Assist in patching our entire infrastructure when needed using a variety of tools • Maintains strong technical abilities, knowledge of new and changing technologies • Prepare for emergencies by creating and/or updating action plans • Jumping into time-sensitive projects wherever needed • Showing flexibility and a willingness to learn • Maintain healthy communication with IT Staff, IT Customers and Vendors • Actively participate in IT Infrastructure and Operations projects, managing, completing, communicating, and fully documenting assigned tasks and deliverables. • Maintain reliable and consistent attendance, including being punctual, and dependable in order to meet the needs of the department and the organization. • Execute each essential duty satisfactorily to perform job successfully. • Follows all safety procedures required in work area, wears PPE as needed, attends all safety meetings, and reports safety issues regarding equipment or unsafe/hazardous conditions. • Performs effectively as a team member, able to work well with others, open to receiving and give feedback, and treats everyone with respect. • Takes ownership of own work and behavior, accepts accountability for own actions, encourages solutions, and communicates status of work/projects. • Follow all department quality standards/criteria. Raise concerns and issues to immediate manager. • Able to understand and demonstrate Cambro company culture, display company core values (Safety, Quality, Respect, and Service). • Understands department's key performance indicators and contributes to achieve these goals both individually and as a team. • Maintains reliable and consistent attendance, including being punctual, dependable, and flexible to potential schedule changes to meet the needs of the department and the organization. • Executes each essential duty satisfactorily to perform job successfully. • Follows all safety procedures required in work area, wears PPE as needed, attends all safety meetings, and reports safety issues regarding equipment or unsafe/hazardous conditions. • Performs effectively as a team member, able to work well with others, open to receive and give feedback, and treats everyone with respect. • Takes ownership of own work and behavior, accepts accountability for own actions, encourages solutions, and communicates status of work/projects. • Follows all department quality standards/criteria. Raises concerns and issues to management. • Understands department's key performance indicators (KPIs) and contributes to achieve these goals both individually and as a team. • Other duties as needed or required. ADDITIONAL RESPONSIBILITIES • Ability to be on call 24 hours a day, 7 days a week for global operations, by periodically providing off-hours, evening, and weekend support to accommodate maintenance windows and issue resolution • Occasional travel to various Cambro locations domestically and internationally as required (15%) • May occasionally guide less experienced associates to help with technical projects • Some travel may be required. REQUIRED QUALIFICATIONS The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. • Bachelor's degree (B.A.) from a four-year accredited college or university. • 5-10 years of experience in IT security, network, administration, and support roles. • Ability to interpret a variety of instructions furnished in written, oral, diagram, or schedule form. • Ability to adapt and adjust plans to meet changing needs. • Proficient in Microsoft Office Suite • Experience with Fortinet solutions, EDR, email security solutions • Solid knowledge of cybersecurity frameworks including NIS, ISO27001/27002, CIS, HIPAA, CCPA/CPRA and GDPR. • Solid working knowledge of Layer 2 (VLANs, Inter-VLANs, VTP Domains, bridge groups, MVRP, ACL's) technologies and network segmentation. • Strong knowledge of DNS records including reverse zones and maintaining DNS records • Strong DHCP Knowledge to include DHCP Fail over and able to configure DCHP relay on Switches • Solid understanding of routing protocols, static routes and ARP cache • Proficient in creating and implementing certificates on layer 2 devices (Switches, Firewalls, Linux Appliances) • Strong troubleshooting skills and possess the ability to find security and network issues in a timely manner • Strong Windows administration skills including Active Directory/GPO's and security policies • Solid working knowledge of Virtualization, such as VMware ESXi servers and vCenter 7.x • Solid working knowledge of Veeam/Bacula/Exagrid backup software to manage backup and restore procedures • Must be able to follow instructions and procedures and ask questions if something is unclear • Excellent documentation skills including ability to create network drawings • Self-motivated and energetic with the ability to manage time efficiently without supervision and to work effectively under pressure • Strong customer service and communication skills • Excellent organizational skills and strong sense of urgency • Familiarity with various network types including LANs, WANs, SDWAN, WLANs, SANs, and VoIP networks • Great accuracy and attention to detail PREFERRED QUALIFICATIONS • Experience in Business Continuity and disaster recovery is a plus • Knowledge of Ruckus Access Points and Switches • Knowledge of IBMi PHYSICAL DEMANDS The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Sitting, walking, standing, bending at the neck, bending at the waist, squatting, climbing, kneeling, crawling, twisting at the neck and waist, repetitive use of hands, simple grasping, power grasping, fine manipulation, pushing and pulling, reaching above and below the shoulder, carrying/lifting up to 50 lbs. Driving cars and other IT equipment Working around equipment and machinery Exposure to excessive noise Exposure to dust, gas, fumes or chemicals Working at heights Use of special visual or auditory protective equipment Walking on uneven ground PPE Requirements Safety glasses Steel-toe slip-resistant shoes - When in production area Hearing protection (e.g. ear plugs, ear muffs) - When in production area Face covering (mask) in accordance with company policy. Hardhat/bump camp IT Application COMPENSATION RANGE: $97,000- $120,000 Salary may vary based on experience. CAMBRO is proud to be an equal-opportunity workplace. All qualified applicants will receive consideration for employment without regard to and will not be discriminated against based upon race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic information, military or veteran status, or other characteristics protected by law.
    $97k-120k yearly Auto-Apply 17d ago
  • Senior Security Engineer

    Goodleap 4.6company rating

    Security engineer job in Irvine, CA

    About GoodLeap:GoodLeap is a technology company delivering best-in-class financing and software products for sustainable solutions, from solar panels and batteries to energy-efficient HVAC, heat pumps, roofing, windows, and more. Over 1 million homeowners have benefited from our simple, fast, and frictionless technology that makes the adoption of these products more affordable, accessible, and easier to understand. Thousands of professionals deploying home efficiency and solar solutions rely on GoodLeap's proprietary, AI-powered applications and developer tools to drive more transparent customer communication, deeper business intelligence, and streamlined payment and operations. Our platform has led to more than $30 billion in financing for sustainable solutions since 2018. GoodLeap is also proud to support our award-winning nonprofit, GivePower, which is building and deploying life-saving water and clean electricity systems, changing the lives of more than 1.6 million people across Africa, Asia, and South America. Position Summary The GoodLeap security team is responsible for both business enablement and safeguarding the organization's information assets; it is involved in virtually all aspects of the business, from product safety and resilience, to building security paved roads, customer, partner, and regulatory trust, managing technology governance and compliance, and ensuring the privacy, and safety of GoodLeap's customers, partners, and employees information. The senior security engineer role provides a unique opportunity to shape the security and resilience of GoodLeap corporate systems, services, and operational processes. In this role, you will work closely with product, engineering, IT, and business teams within GoodLeap, acting as the key individual with both the authority and responsibility to ensure the safety and resilience of enterprise systems, products, and services. Your oversight will encompass: - Enterprise systems:Identifying potential misuse and abuse cases, proposing solutions to address these scenarios, and identifying product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. - Build-time controls: Managing applications/products security controls and activities during development. - Runtime controls: Overseeing security measures at runtime, from prevention to detection and response. Additionally, you will be involved with aspects of internally built products and represent all areas of security, spanning governance, risk, and compliance (GRC) to security monitoring, for a number of departments/teams. You will also have the authority and ability to involve other security team members as needed. While you will take on multiple responsibilities-from advisor to builder and beyond-your primary focus will be designing and building security patterns and practices for services and processes, and fostering strong relationships with product, business, and engineering. Essential Job Duties & Responsibilities Lead, participate in, and contribute to partnerships between security, IT, General & Administrative teams, engineering, product, and operations teams to build, orchestrate, and automate security controls and services in GoodLeap enterprise systems, products, services, and operational processes. Identify potential misuse and abuse cases in enterprise systems, propose solutions to address these scenarios, and identify product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. Support or develop components of the security analytics platform. Contribute to investigations, threat hunting, and incident response activities in a supporting role. Collaborate with the monitoring and response team to create playbooks for specific incident response scenarios related to the products and services you oversee. These investigations, incidents, and playbooks may address security, fraud, privacy, resilience, and related concerns. Support the security operations team with the vulnerability management lifecycle for products and services under your purview. Ensure technical alignment for the products and services you oversee with team initiatives, including GRC, security operations, and monitoring and response activities. Required Skills, Knowledge & Abilities Strong communicator with the ability to lead technical architecture discussions, drive technical decisions, and effectively communicate with non-technical audiences. Expertise in agile product lifecycles. Ideally, you have experience in a product manager or engineering manager role and understand how SaaS products (B2B, B2B2C, and B2C) are built, including roadmap planning and feature and defect prioritization. Experience with threat modeling methodologies, with the ability to create efficient and scalable approaches to conducting such assessments. Familiarity with AWS services, including KMS, SST, Container Registry, ELBs, Lambda, API Gateway, CloudTrail, and IAM (knowledge of GCP and/or Azure is a plus). Proven ability to establish credibility and build trust with business, engineers, and operational staff; confident yet humble. Hands-on experience with managing security for core enterprise systems, e.g., ERP, HCM, Salesforce, etc. Strong understanding of both human and non-human identity management and common enterprise and consumer authentication standards and use cases. Practical experience with CI/CD pipelines and DevOps tools, including Infrastructure-as-Code (IaC) tools like Terraform, Pulumi, or CDK; GitHub and GitHub Actions; artifact management; and secrets management tools like Doppler and HashiCorp Vault. Passionate about learning new technologies. While you're not expected to know everything, you should demonstrate a willingness and ability to learn as needed. Prior experience interfacing and supporting with G&A teams, internal product teams, and other cross-functional areas. Proficiency in writing automation scripts in multiple languages, with prior experience automating security processes in cloud or SaaS environments. Experience engaging with vendors in design partnerships. Experience overseeing vulnerability and threat management at the platform and application levels. Familiarity with penetration testing and red team exercises, including manual verification, exploitation, and lateral movement. Ability to balance a high-level view of security strategy with attention to detail, ensuring thorough and effective execution. Additional Information Regarding Job Duties and s: Job duties include additional responsibilities as assigned by one's supervisor or other managers related to the position/department. This job description is meant to describe the general nature and level of work being performed; it is not intended to be construed as an exhaustive list of all responsibilities, duties and other skills required for the position. The Company reserves the right at any time with or without notice to alter or change job responsibilities, reassign or transfer job position or assign additional job responsibilities, subject to applicable law. The Company shall provide reasonable accommodations of known disabilities to enable a qualified applicant or employee to apply for employment, perform the essential functions of the job, or enjoy the benefits and privileges of employment as required by the law. If you are an extraordinary professional who thrives in a collaborative work culture and values a rewarding career, then we want to work with you! Apply today! We are committed to protecting your privacy. To learn more about how we collect, use, and safeguard your personal information during the application process, please review our Employment Privacy Policy and Recruiting Policy on AI.
    $114k-145k yearly est. Auto-Apply 60d+ ago
  • Controls Security & Fire System Engineer III

    Johnson Controls Holding Company, Inc. 4.4company rating

    Security engineer job in Huntington Beach, CA

    What you do Be responsible for Pre Sales Support & End User Support for, but not limited to the design, configuration, and operation of complete building low voltage systems, including fire, security, and other low voltage control sub-systems (i.e. lighting, nurse call, data networks, etc.) to meet the intent of the project requirements. Accountable to field teams for quality, timeliness and efficiency of designs. Develops complex software programs, commissions and troubleshooting to ensure proper operations of the building control system. Provides detailed information and submittals to communicate design and operation to customers, consultants, Johnson Controls field installation team and subcontractors. How will you do it - Sales Support and End User Support · Possible job walks with the Sales Team on the initial design phase · Designs and configures are technically complex building control systems as defined by the contract documents. · Creates flow diagrams, sequence of operations, bill of material, network layouts and electrical schematics as required. · Develop and tests software programs necessary to operate the system per the project requirements' intent. · Coordinates the creation of necessary drawings and equipment schedules for submittals and installation. · Assists in the loading and commissioning of all system and network-level controllers as required. · Assists in validation of complete system functionality and troubleshoots problems with subcontractors and other trades to ensure proper operation. · Provides field change information to the project team for the creation of as-built drawings and software. · Keeps management and JCI contractor or customer informed of job progress and issues. · Assists in performing site-specific training for owner/operator on the total building control system. · Participates in release meeting with the project field team. · Performs value engineering to provide cost effective results while maintaining customer satisfaction. · Adheres to safety standards. · High degree of employee and subcontractor safety. What we look for Required Qualifications · Minimum of seven years of experience, or an associate degree in a related technical field with seven years of relevant work experience required. · Demonstrated knowledge of the construction, mechanical, electrical, or HVAC service industry. · Demonstrated knowledge of mechanical drawings, electrical wiring diagrams, control theory, automatic temperature controls, building automation systems and other building subsystems. · Demonstrated experience in the integration of low voltage building sub-systems using various industry protocols (i.e. LON, BACnet, etc.). · Ability to relate technical knowledge to a non-technical audience. · Demonstrated advanced computer skills required, particularly computer-related drafting tools, such as Visio. Preferred Qualifications · Bachelor's degree in engineering with a minimum of five years of experience, or an associate degree in a related technical field with seven years of relevant work experience required. · Understanding of IP networking for building automation systems. · Understanding of Tridium/Niagara Framework HIRING SALARY RANGE: $100K to $125K (Salary to be determined by the education, experience, knowledge, skills, and abilities of the applicant, internal equity, location and alignment with market data.) This role offers a competitive Bonus plan that will take into account individual, group, and corporate performance. This position includes a competitive benefits package. For details, please visit the About Us tab on the Johnson Controls Careers site at ***************************************** Johnson Controls International plc. is an equal employment opportunity and affirmative action employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, protected veteran status, genetic information, sexual orientation, gender identity, status as a qualified individual with a disability or any other characteristic protected by law. To view more information about your equal opportunity and non-discrimination rights as a candidate, visit EEO is the Law. If you are an individual with a disability and you require an accommodation during the application process, please visit here.
    $100k-125k yearly Auto-Apply 17d ago
  • Information Security Analyst

    T3W Business Solutions, Inc.

    Security engineer job in San Diego, CA

    Requirements Bachelor's degree in Cybersecurity, Computer Science, or related field. 3+ years of experience in information assurance or cybersecurity. DoD 8570 IAT Level II certification (Security+ CE, CySA+, or equivalent). Familiarity with NIST, DISA STIGs, and DoD RMF compliance. Must possess an active Secret Clearance - Required This contractor and subcontractor shall abide by the requirements of 41 CFR §§ 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on their race, color, religion, sex, sexual orientation, gender identity or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment individuals without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status or disability. Salary Description $88,000-$102,000
    $88k-102k yearly 20d ago
  • Cybersecurity Lead/Information Systems Security Officer (ISSO)

    Data Intelligence 4.5company rating

    Security engineer job in San Diego, CA

    Data Intelligence, LLC is seeking a highly experienced Cyber Security Lead / Information Systems Security Officer (ISSO) to support cybersecurity operations and compliance for Navy and Department of Defense (DoD) systems. This role requires deep expertise in Information Assurance (IA), cybersecurity compliance frameworks, and Navy-specific cybersecurity practices. The ideal candidate will have extensive experience working with Navy Cross Domain Solutions (NCDSO) and a strong technical background in military C4I/IT systems. Key Responsibilities: Serve as the Cyber Security Lead/ISSO for classified and unclassified Navy/DoD systems. Lead Risk Management Framework (RMF) efforts in accordance with DoD 8500 Series, NIST SP 800 Series, and other applicable cybersecurity policies and guidelines. Develop, review, and manage technical documentation including System Security Plans (SSPs), Security Assessment Reports (SARs), and Plan of Action & Milestones (POA&Ms). Interface with the Navy Cross Domain Solutions Office (NCDSO) to support secure cross-domain solutions, including submission packages and coordination of approvals. Provide subject matter expertise in support of system security engineering, integration, and testing. Coordinate with system engineers, developers, and stakeholders to ensure security controls are effectively implemented. Monitor systems for compliance with DFARS Clause ************ and other DoD IA requirements. Assist in the preparation and review of technical instructions, engineering plans, and test-related documentation. Maintain up-to-date knowledge of emerging cybersecurity threats, tools, and regulatory requirements. Support system Certification and Accreditation (C&A) processes in accordance with NSA and DoD standards. Required Qualifications: Education: Master's degree from an accredited college or university in Computer Science, Information Systems Management, Cybersecurity, or a related field. Experience: Minimum of 10 years of Navy or DoD experience in Information Assurance and Cybersecurity. At least 5 years of recent experience (within the last 5 years) directly supporting Navy cybersecurity programs and RMF processes. Direct experience with the Navy Cross Domain Solutions Office (NCDSO) within the last five years. Demonstrated expertise in DoD cybersecurity requirements, including the DoD 8500 Series and NIST SP 800 Series. Experience with engineering documentation including technical instructions, engineering plans, and systems integration documents. Strong understanding of military C4I/IT systems, including Navy SATCOM (MILSATCOM and Commercial), Tactical Communications, and GPS systems. High familiarity with the NSA certification process for secure systems. Certifications: Compliant with DFARS Clause ************ for Information Assurance Contractor Training and Certification (e.g., CISSP, CISM, Security+, or equivalent). Security Clearance: Must hold an active Top Secret / SCI (TS/SCI) clearance. Preferred Skills: Strong leadership and communication skills with the ability to brief senior stakeholders. Ability to lead complex cybersecurity projects with minimal supervision. In-depth knowledge of secure system design and implementation in classified environments. Experience collaborating with cybersecurity authorities across Navy and DoD organizations. About Data Intelligence, LLC: Data Intelligence, LLC (DI) is a small business that provides Information Technology System Development (Agile, DevSecOps, Cloud Platform support) Cybersecurity (RMF, Security Engineering, Cross Domain Solutions), Tactical Data Link Standards Development and Testing, and Logistics/Warehousing services to U.S. federal clients both CONUS and OCONUS. DI consistently demonstrates exceptional customer service, maintains an employee-centric culture, and delivers hands-on technical expertise to help our clients achieve their mission. Since 2005, DI has successfully provided IT Systems Engineering, Software Development, Cybersecurity, and supporting solutions and services to customers that include the Department of Defense, Intelligence, and Federal Civilian clients. Current clients include the US Navy, Air Force, Army, Marine Corps, Coast Guard, National Geospatial-Intelligence Agency, Defense Logistics Agency, and The Department of Homeland Security. DI is headquartered in Marlton, New Jersey, with satellite offices in California, Maryland, Ohio, Pennsylvania, Virginia, and Washington, D.C. Why you should join us: Data Intelligence offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays. Data Intelligence is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
    $83k-111k yearly est. 60d+ ago
  • Information Security Analyst II

    Playstation 4.8company rating

    Security engineer job in San Diego, CA

    Why PlayStation? PlayStation isn't just the Best Place to Play - it's also the Best Place to Work. Today, we're recognized as a global leader in entertainment producing The PlayStation family of products and services including PlayStation 5, PlayStation 4, PlayStation VR, PlayStation Plus, acclaimed PlayStation software titles from PlayStation Studios, and more. PlayStation also strives to create an inclusive environment that empowers employees and embraces diversity. We welcome and encourage everyone who has a passion and curiosity for innovation, technology, and play to explore our open positions and join our growing global team. The PlayStation brand falls under Sony Interactive Entertainment, a wholly-owned subsidiary of Sony Group Corporation. PlayStation is looking for an Information Security Analyst to join our team and operate the day-to-day Information Security, Risk and Compliance management processes. This is a mixture of processing requests from the business and driving internal security projects such as security audit and assessment. This role requires a sound understanding of technical and engineering terminology, outstanding ability to articulate risk across any security domains (technical and governance) with the demonstrable ability to work independently and process high volumes of security requests on a weekly basis. This role also provides ample opportunity to work across technical and game-related projects with studio and PlayStation engineering teams and therefore requires risk advisory and influencing experience. Based in San Diego, the candidate will be the key business relationship partner on behalf of Information Security and work on Information Security processes as well as strategic projects across PlayStation and the Studios group. This role will collaborate closely directly with business, technical and third party collaborators, as well as work multi-functionally with our other Information Security specialist teams across the globe to protect PlayStation's intellectual property, data and infrastructure whilst delivering new and evolving games, services and hardware to the market. This is an opportunity to provide security directly to the global PlayStation business, our PlayStation Network and global Studios and their game development. What you will be doing: Serve as a primary partner to PlayStation Studios, supporting security risk management across global game development and studio environments. Triage and manage technical and strategic security risks across studios, ensuring alignment to security strategy and policy compliance. Engage directly with technical teams and studio leadership to strengthen risk posture, manage vulnerabilities, and drive mitigation strategies. Act as a trusted advisor to studio teams, driving a culture of embedding “security by design” principles. Support the creation of risk insights, reporting, and executive briefings that inform leadership on studio security health and emerging trends. Maintain broad knowledge of emerging security trends, risks, adn technologies that are applicable to the studio business and Sony at large. Advance the Information Security program through collaborative and cross-team partnerships. Required Experience: 3+ years of experience in information security, with demonstrated expertise in risk identification and mitigation. 2+ years conducting risk assessments and providing actionable recommendations to technical and business stakeholders. 2+ years working in vulnerability management, including detection, analysis, reporting, or remediation tracking. 2+ years of hands-on experience managing or evaluating cloud environments, networks, and security infrastructure. 2+ years of experience communicating risk and security insights to leadership and cross-functional partners. Preferred Experience & Attributes: Background in the gaming or entertainment industry. Experience leading projects or programs in a security or risk management capacity. Technical and Security focused certifications a strong preference Confident communicator able to translate complex security risk concepts for both technical and non-technical audiences. Comfortable working in a dynamic, fast-paced environment balancing innovation and security priorities. Proven success working independently to establish relationships, deliver requirements, and communicate effectively. #LI-GM1 Please refer to our Candidate Privacy Notice for more information about how we process your personal information, and your data protection rights. At SIE, we consider several factors when setting each role's base pay range, including the competitive benchmarking data for the market and geographic location. Please note that the base pay range may vary in line with our hybrid working policy and individual base pay will be determined based on job-related factors which may include knowledge, skills, experience, and location. In addition, this role is eligible for SIE's top-tier benefits package that includes medical, dental, vision, matching 401(k), paid time off, wellness program and coveted employee discounts for Sony products. This role also may be eligible for a bonus package. Click here to learn more. The estimated base pay range for this role is listed below.$140,000-$210,000 USD Equal Opportunity Statement: Sony is an Equal Opportunity Employer. All persons will receive consideration for employment without regard to gender (including gender identity, gender expression and gender reassignment), race (including colour, nationality, ethnic or national origin), religion or belief, marital or civil partnership status, disability, age, sexual orientation, pregnancy, maternity or parental status, trade union membership or membership in any other legally protected category. We strive to create an inclusive environment, empower employees and embrace diversity. We encourage everyone to respond. PlayStation is a Fair Chance employer and qualified applicants with arrest and conviction records will be considered for employment.
    $140k-210k yearly Auto-Apply 2d ago
  • Staff Product Security Engineer (SSDL)

    Servicenow, Inc. 4.7company rating

    Security engineer job in San Diego, CA

    It all started in sunny San Diego, California in 2004 when a visionary engineer, Fred Luddy, saw the potential to transform how we work. Fast forward to today - ServiceNow stands as a global market leader, bringing innovative AI-enhanced technology to over 8,100 customers, including 85% of the Fortune 500 . Our intelligent cloud-based platform seamlessly connects people, systems, and processes to empower organizations to find smarter, faster, and better ways to work. But this is just the beginning of our journey. Join us as we pursue our purpose to make the world work better for everyone. ****PLEASE NOTE**: This role requires a minimum of 2 days per week in our San Diego, CA ServiceNow Office. Please do not apply if you cannot meet this requirement. Thank you** **The ServiceNow Security Organization (SSO):** The ServiceNow Security Organization (SSO) delivers world-class, innovative security solutions to reduce risk and protect the company and our customers. We enable our customers to migrate their most sensitive data and workloads to the cloud, accelerating our business so that we are the most trusted SaaS provider. We create an environment where our employees are proud to work and can make a positive impact **Team:** Product Security is Shifting Everywhere and holistically improving the maturity of the security program. The Secure Software Development Lifecycle (SSDL) team helps the organization measure and improve security activities. The team leads product threat modeling, helps to improve security behaviors, and manages a highly visible security champions program. The team is both highly technical and strategic. **Role:** As a Staff Product Security Engineer on the ServiceNow SSDL team, you will collaborate with developers and software architects on highly technical solutions and help the organization build secure and resilient software. You will be threat modeling software products and services to identify potential risk and participate in architectural reviews of products in development. A key part of this position is to ensure the continued success of a large and growing security champions program. You will help mentor security champions and assist them in secure software design. As a Staff Product Security Engineer, you will help security champions be successful. **What you get to do in this role:** + Work on a wide range of technologies + Work on complex architectural and technical challenges + Participate in threat modeling activities + Mentor and collaborate with development teams to adopt secure coding practices + Work on strategic and highly visible security activities across the organization + Be an advocate for security and participate in a security champions program **To be successful in this role, we need someone who has:** + Experience in leveraging or critically thinking about how to integrate AI into work processes, decision-making, or problem-solving. This may include using AI-powered tools, automating workflows, analyzing AI-driven insights, or exploring AI's potential impact on the function or industry. + 2+ years of experience in software development + 8+ years of experience in software security (AppSec) + 2+ years of experience in threat modeling software applications and services + Proficient in threat modeling methodologies such as STRIDE or PASTA and their applied use in fast-moving, iterative development lifecycles + In-depth knowledge of common web application vulnerabilities (OWASP Top 10) + Developer-level proficiency in one or more languages - Python, Java, JavaScript, and Golang preferred + Working knowledge of Machine Learning and taxonomies such as BIML that categorize known attacks on machine learning models + In-depth knowledge of software design patterns and their security considerations + In-depth knowledge of authentication and authorization standards including OAuth, OIDC, SAML, JWT, and PASETO + Knowledge of symmetric and asymmetric cryptography, digital signatures, PKI, TLS, and cryptographic hash functions + Knowledge of cloud native technologies including containers, Kubernetes, and services provided by AWS, GCP, and Azure + Knowledge of static analysis (SAST), dynamic analysis (DAST), and software composition analysis (SCA) security tools + Knowledge of OWASP ASVS, SCVS, and related verification standards + Ability to work collaboratively in a highly distributed team + Ability to communicate technical concepts to business stakeholders + A passion for security **\#SecurityJobs** For positions in this location, we offer a base pay of: $155,800 to $272,700 plus equity (when applicable), variable/incentive compensation and benefits. Sales positions generally offer a competitive On Target Earnings (OTE) incentive compensation structure. Please note that the base pay shown is a guideline, and individual total compensation will vary based on factors such as qualifications, skill level, competencies, and work location. We also offer health plans, including flexible spending accounts, a 401(k) Plan with company match, ESPP, matching donations, a flexible time away plan and family leave programs. Compensation is based on the geographic location in which the role is located and is subject to change based on work location. **Work Personas** We approach our distributed world of work with flexibility and trust. Work personas (flexible, remote, or required in office) are categories that are assigned to ServiceNow employees depending on the nature of their work and their assigned work location. Learn more here (************************************************************************************************************************************* . To determine eligibility for a work persona, ServiceNow may confirm the distance between your primary residence and the closest ServiceNow office using a third-party service. **Equal Opportunity Employer** ServiceNow is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, creed, religion, sex, sexual orientation, national origin or nationality, ancestry, age, disability, gender identity or expression, marital status, veteran status, or any other category protected by law. In addition, all qualified applicants with arrest or conviction records will be considered for employment in accordance with legal requirements. **Accommodations** We strive to create an accessible and inclusive experience for all candidates. If you require a reasonable accommodation to complete any part of the application process, or are unable to use this online application and need an alternative method to apply, please contact ***************************** for assistance. **Export Control Regulations** For positions requiring access to controlled technology subject to export control regulations, including the U.S. Export Administration Regulations (EAR), ServiceNow may be required to obtain export control approval from government authorities for certain individuals. All employment is contingent upon ServiceNow obtaining any export license or other approval that may be required by relevant export control authorities. From Fortune. ©2025 Fortune Media IP Limited. All rights reserved. Used under license.
    $155.8k-272.7k yearly 13d ago
  • Embedded Security Engineer

    Saronic

    Security engineer job in San Diego, CA

    Saronic Technologies is a leader in revolutionizing defense autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations for the Department of Defense (DoD) through autonomous and intelligent platforms. Saronic Technologies is a leader in defense autonomy at sea. We're seeking an Embedded Security Engineer to design, implement, and harden security for the software that runs on our autonomous surface vessels. You'll work across device identity, secure boot and update flows, secrets/key management, and secure communications-partnering closely with autonomy, platform, manufacturing, and field teams to deliver trustworthy systems that operate reliably in maritime environments. Senior Engineers: 3+ years of experience delivering security features on embedded/Linux systems, preferably in autonomy, robotics, aerospace, or defense. Staff Engineers: 8+ years of experience including technical leadership across secure boot/update pipelines, identity/PKI, and fleet-wide hardening; demonstrated ownership of mission-critical features from design through field deployment.Key Responsibilities: Design, develop, and maintain security features for embedded Linux systems (systemd-managed services, Rust/C/C++) used for navigation, control, and communications. Own per-vessel identity and mutual authentication for boat↔cloud and boat↔boat links; implement certificate/key rotation and revocation workflows. Implement signed/verified update mechanisms with rollback protection; collaborate with manufacturing on secure boot enablement and key provisioning. Integrate and operate hardware-backed key storage (e.g., TPM/secure elements) and sealed secrets for on-vessel services. Harden network paths over constrained links: TLS/mTLS, VPN overlay policies, and least-privilege service access. Reduce attack surface in embedded services (capabilities, seccomp/AppArmor where appropriate, safe process execution, input validation). Build tamper-evident, structured logging and diagnostics suitable for ship→shore analysis and incident response. Perform threat modeling, code reviews, and security testing (static/dynamic analysis, fuzzing, negative testing). Troubleshoot and debug complex security issues in fielded systems; author runbooks and safe-rollback procedures. Document designs, processes, and verification results for compliance and knowledge sharing; contribute to secure coding guidelines. Stay current on emerging security technologies and best practices relevant to embedded Linux and autonomous systems. Required Qualifications: Bachelor's or Master's degree in Computer Science, Electrical/Computer Engineering, Software Engineering, or a related field. Proficiency in Rust and/or C/C++ developing software for embedded Linux. Strong understanding of cryptographic primitives and protocols (keys, certificates, signatures, TLS/mTLS), and experience integrating them into systems. Experience with secure/verified boot, OTA/update safety, and firmware/bootloader workflows. Familiarity with VPN overlays and constrained-network security patterns. Comfortable with Linux security fundamentals (users/permissions, capabilities, sandboxing) and systemd-based service management. Excellent problem-solving skills and ability to collaborate effectively in na fast-paced, cross-functional environment. Strong written and verbal communication skills. This role requires the ability to obtain and maintain a security clearance Preferred Qualifications: Experience with TPM/secure elements, measured/verified boot, and attestation. Exposure to NixOS-based builds, Yocto, or similar embedded Linux tooling. Experience with authenticated media/telemetry pipelines and secure streaming. DoD/defense domain familiarity and prior work under export-controlled constraints. Physical Demands: Prolonged periods of sitting at a desk and working on a computer. Occasional standing and walking within the office. Manual dexterity to operate a computer keyboard, mouse, and other office equipment. Visual acuity to read screens, documents, and reports. Occasional reaching, bending, or stooping to access file drawers, cabinets, or office supplies. Lifting and carrying items up to 20 pounds occasionally (e.g., office supplies, packages). Benefits:Medical Insurance: Comprehensive health insurance plans covering a range of services Saronic pays 100% of the premium for employees and 80% for dependents Dental and Vision Insurance: Coverage for routine dental check-ups, orthodontics, and vision care Saronic pays 100% of the premium under the basic plan for employees and 80% for dependents Time Off: Generous PTO and HolidaysParental Leave: Paid maternity and paternity leave to support new parents Competitive Salary: Industry-standard salaries with opportunities for performance-based bonuses Retirement Plan: 401(k) plan Stock Options: Equity options to give employees a stake in the company's success Life and Disability Insurance: Basic life insurance and short- and long-term disability coverage Pet Insurance: Discounted pet insurance options including 24/7 Telehealth helpline Additional Perks: Free lunch benefit and unlimited free drinks and snacks in the office This role requires access to export-controlled information or items that require “U.S. Person” status. As defined by U.S. law, individuals who are any one of the following are considered to be a “U.S. Person”: (1) U.S. citizens, (2) legal permanent residents (a.k.a. green card holders), and (3) certain protected classes of asylees and refugees, as defined in 8 U.S.C. 1324b(a)(3) . Saronic does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.
    $101k-144k yearly est. Auto-Apply 34d ago
  • Senior Security Engineer

    Goodleap 4.6company rating

    Security engineer job in Irvine, CA

    About GoodLeap:GoodLeap is a technology company delivering best-in-class financing and software products for sustainable solutions, from solar panels and batteries to energy-efficient HVAC, heat pumps, roofing, windows, and more. Over 1 million homeowners have benefited from our simple, fast, and frictionless technology that makes the adoption of these products more affordable, accessible, and easier to understand. Thousands of professionals deploying home efficiency and solar solutions rely on GoodLeap's proprietary, AI-powered applications and developer tools to drive more transparent customer communication, deeper business intelligence, and streamlined payment and operations. Our platform has led to more than $30 billion in financing for sustainable solutions since 2018. GoodLeap is also proud to support our award-winning nonprofit, GivePower, which is building and deploying life-saving water and clean electricity systems, changing the lives of more than 1.6 million people across Africa, Asia, and South America. Position Summary The GoodLeap security team is responsible for both business enablement and safeguarding the organization's information assets; it is involved in virtually all aspects of the business, from product safety and resilience, to building security paved roads, customer, partner, and regulatory trust, managing technology governance and compliance, and ensuring the privacy, and safety of GoodLeap's customers, partners, and employees information. The senior security engineer role provides a unique opportunity to shape the security and resilience of GoodLeap corporate systems, services, and operational processes. In this role, you will work closely with product, engineering, IT, and business teams within GoodLeap, acting as the key individual with both the authority and responsibility to ensure the safety and resilience of enterprise systems, products, and services. Your oversight will encompass: - Enterprise systems:Identifying potential misuse and abuse cases, proposing solutions to address these scenarios, and identifying product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. - Build-time controls: Managing applications/products security controls and activities during development. - Runtime controls: Overseeing security measures at runtime, from prevention to detection and response. Additionally, you will be involved with aspects of internally built products and represent all areas of security, spanning governance, risk, and compliance (GRC) to security monitoring, for a number of departments/teams. You will also have the authority and ability to involve other security team members as needed. While you will take on multiple responsibilities-from advisor to builder and beyond-your primary focus will be designing and building security patterns and practices for services and processes, and fostering strong relationships with product, business, and engineering. Essential Job Duties & Responsibilities Lead, participate in, and contribute to partnerships between security, IT, General & Administrative teams, engineering, product, and operations teams to build, orchestrate, and automate security controls and services in GoodLeap enterprise systems, products, services, and operational processes. Identify potential misuse and abuse cases in enterprise systems, propose solutions to address these scenarios, and identify product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. Support or develop components of the security analytics platform. Contribute to investigations, threat hunting, and incident response activities in a supporting role. Collaborate with the monitoring and response team to create playbooks for specific incident response scenarios related to the products and services you oversee. These investigations, incidents, and playbooks may address security, fraud, privacy, resilience, and related concerns. Support the security operations team with the vulnerability management lifecycle for products and services under your purview. Ensure technical alignment for the products and services you oversee with team initiatives, including GRC, security operations, and monitoring and response activities. Required Skills, Knowledge & Abilities Strong communicator with the ability to lead technical architecture discussions, drive technical decisions, and effectively communicate with non-technical audiences. Expertise in agile product lifecycles. Ideally, you have experience in a product manager or engineering manager role and understand how SaaS products (B2B, B2B2C, and B2C) are built, including roadmap planning and feature and defect prioritization. Experience with threat modeling methodologies, with the ability to create efficient and scalable approaches to conducting such assessments. Familiarity with AWS services, including KMS, SST, Container Registry, ELBs, Lambda, API Gateway, CloudTrail, and IAM (knowledge of GCP and/or Azure is a plus). Proven ability to establish credibility and build trust with business, engineers, and operational staff; confident yet humble. Hands-on experience with managing security for core enterprise systems, e.g., ERP, HCM, Salesforce, etc. Strong understanding of both human and non-human identity management and common enterprise and consumer authentication standards and use cases. Practical experience with CI/CD pipelines and DevOps tools, including Infrastructure-as-Code (IaC) tools like Terraform, Pulumi, or CDK; GitHub and GitHub Actions; artifact management; and secrets management tools like Doppler and HashiCorp Vault. Passionate about learning new technologies. While you're not expected to know everything, you should demonstrate a willingness and ability to learn as needed. Prior experience interfacing and supporting with G&A teams, internal product teams, and other cross-functional areas. Proficiency in writing automation scripts in multiple languages, with prior experience automating security processes in cloud or SaaS environments. Experience engaging with vendors in design partnerships. Experience overseeing vulnerability and threat management at the platform and application levels. Familiarity with penetration testing and red team exercises, including manual verification, exploitation, and lateral movement. Ability to balance a high-level view of security strategy with attention to detail, ensuring thorough and effective execution. In addition to the above salary, this role may be eligible for a bonus. Additional Information Regarding Job Duties and s: Job duties include additional responsibilities as assigned by one's supervisor or other managers related to the position/department. This job description is meant to describe the general nature and level of work being performed; it is not intended to be construed as an exhaustive list of all responsibilities, duties and other skills required for the position. The Company reserves the right at any time with or without notice to alter or change job responsibilities, reassign or transfer job position or assign additional job responsibilities, subject to applicable law. The Company shall provide reasonable accommodations of known disabilities to enable a qualified applicant or employee to apply for employment, perform the essential functions of the job, or enjoy the benefits and privileges of employment as required by the law. If you are an extraordinary professional who thrives in a collaborative work culture and values a rewarding career, then we want to work with you! Apply today! We are committed to protecting your privacy. To learn more about how we collect, use, and safeguard your personal information during the application process, please review our Employment Privacy Policy and Recruiting Policy on AI. We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $114k-145k yearly est. 20d ago
  • Information Security Analyst I (Temporary)

    T3W Business Solutions

    Security engineer job in San Diego, CA

    T3W Business Solutions, Inc. is a Woman-Owned Small Business with Headquarters located in San Diego, CA. It is our mission to help our clients develop strategies to optimize their use of space and resources resulting in maximum benefits; we also deliver quality data and analysis to support our clients' daily facility operations, planning, and compliance programs. We are looking for an Information Security Analyst I (NIWC Pacific) in San Diego, CA. ** This is a temporary position that could last 13 months** Position Summary Provide professional information security services assist NIWC Pacific Security Support Services. Responsibilities Function as a Key Management Infrastructure (KMI) Operating Account Manager (KOAM) Clerk and to be responsible for maintaining Two-Person Integrity (TPI) requirements as outlined in Navy Regulations Prepare and maintains accurate records of COMSEC material received, held, transferred, hand receipted, and destroyed IAW Electronic Key Management System (EKMS) 1 (series) Maintain message files and correspondence originated pertaining to the maintenance and administration of COMSEC accounts Transfer/receipt of Communications Security (COMSEC) to/from the account to include - wrapping material and inspecting packages for discrepancies/tampering Conduct destruction, dispose/recycle equipment components and report compliance IAW EKMS 5 series Assist with Inspection of COMSEC containers/secure rooms IAW Department of the Navy (DoN) and Department of Defense (DoD) security doctrine. Issue secure voice equipment and install KEYMAT prior to issue and ensure units are re-keyed quarterly Provide customer support by assisting COMSEC users at the Customer Service counter, answering the phones, and making appointment for customers Knowledge, Skills, and Abilities Knowledge of Department of the Navy (DoN) and Department of Defense (DoD) security regulations and policies related to Communications Security (COMSEC) principles, policy and procedures concerning control, accountability and use of cryptographic equipment, software, keying material Knowledge of Key Management Infrastructure (KMI) Policies and national/user level requirements for traditional COMSEC accounting as well as the operation of electronic key management system (EKMS)/KMI accounts Knowledge of Secretary of the Navy Instruction (SECNAV) 5510.30 and 5510.36 directives Knowledge of DoN packing and shipping procedures for classified and controlled cryptographic items Skills in performing software upgrades using SKL Skills in performing destruction of COMSEC Material IAW DoN Regulations Requirements Minimum active Secret clearance and ability to obtain and maintain a Top Secret (SCI) clearance 0-2 years of relevant experience A valid driver's license Ability to lift items up to 40lbs when offloading shipments or moving material Proficient in Microsoft Office applications, such as Word, Excel, PowerPoint, and Access Ability to walk moderate distances, stoops, bend, climb, kneel, push, and pull in the performance of semiannual inventories Infrequent travel may be required Preferred Active TS clearance or higher Prior military experience/background (preferably Navy or Marines) This contractor and subcontractor shall abide by the requirements of 41 CFR §§ 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on their race, color, religion, sex, sexual orientation, gender identity or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment individuals without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status or disability. Salary Description $68,400-$71,000
    $68.4k-71k yearly 14d ago
  • Principal Product Security Engineer

    Servicenow 4.7company rating

    Security engineer job in San Diego, CA

    It all started in sunny San Diego, California in 2004 when a visionary engineer, Fred Luddy, saw the potential to transform how we work. Fast forward to today - ServiceNow stands as a global market leader, bringing innovative AI-enhanced technology to over 8,100 customers, including 85% of the Fortune 500 . Our intelligent cloud-based platform seamlessly connects people, systems, and processes to empower organizations to find smarter, faster, and better ways to work. But this is just the beginning of our journey. Join us as we pursue our purpose to make the world work better for everyone. Job Description **Please note**: this role requires a minimum of 2 days per week in the San Diego, CA ServiceNow Office - PLEASE DO NOT APPLY IF YOU CANNOT MEET THIS REQUIREMENT FIRST, Thank you The ServiceNow Security Organization (SSO): The ServiceNow Security Organization (SSO) delivers world-class, innovative security solutions to reduce risk and protect the company and our customers. We enable our customers to migrate their most sensitive data and workloads to the cloud, accelerating our business so that we are the most trusted SaaS provider. We create an environment where our employees are proud to work and can make a positive impact The Security Research / Offensive Security team delivers red-team like engagements and produces investigative reports that drive a reduction in operational security risk. Paired with a toolkit of code/program and dynamic environmental analysis skills, the team provides guidance on primary security controls, best practices, and product enhancement. Exploration techniques focus on problems broadly, measuring industry trends and product insecurity across ServiceNow's cloud environment. As a Principal Product Security Engineer, you'll be responsible for delivering offensive security engagements against ServiceNow public facing and internal products. You'll also be responsible for security auditing of the ServiceNow product stack and researching nuance of securing SaaS platforms. This will require an in-depth knowledge of various approaches to application auditing including secure code review, debugging, dynamic web application testing, analysis and threat modeling. You'll work closely with product engineering teams to providing investigative reports to improve platform resiliency and ensure best-in-class security solutions. What you get to do in this role: Work with diverse business and technology owners Participate in offensive security engagements including external adversarial emulation. Perform security audits to discover, communicate, and recommend remediation activities for vulnerabilities Work with engineering teams on remediation Create and maintain strategic relationships Qualifications To be Successful in this role you have: Experience in leveraging or critically thinking about how to integrate AI into work processes, decision-making, or problem-solving. This may include using AI-powered tools, automating workflows, analyzing AI-driven insights, or exploring AI's potential impact on the function or industry. A passion for security and problem solving Background in software security auditing, computer security and the statistical methods 15+ years of experience performing software security auditing including code review, reverse engineering, thick app analysis, and black-box web application testing or related experience and education Familiarity with NIST 800-53 and similar controls frameworks Developer level proficiency in Python, Java, and JavaScript, including modern client-side JavaScript frameworks Experience in leveraging or critically thinking about how to integrate AI into work processes, decision-making, or problem-solving. This may include using AI-powered tools, automating workflows, analyzing AI-driven insights, or exploring AI's potential Experience writing static code analysis rules a plus Experience with Python data science and machine learning frameworks a plus Network and system security engineering skills a plus Degree in computer science / engineering, informatics, mathematics/statistics, or equivalent work experience Offensive Security OSWE and/or OSCP certification(s) a plus Nice to haves: 5+ years of experience with ServiceNow Platform internals 3+ years of experience performing threat modeling for software products #SecurityJobs For positions in this location, we offer a base pay of: $212,400 to $371,700, plus equity (when applicable), variable/incentive compensation and benefits. Sales positions generally offer a competitive On Target Earnings (OTE) incentive compensation structure. Please note that the base pay shown is a guideline, and individual total compensation will vary based on factors such as qualifications, skill level, competencies, and work location. We also offer health plans, including flexible spending accounts, a 401(k) Plan with company match, ESPP, matching donations, a flexible time away plan and family leave programs. Compensation is based on the geographic location in which the role is located and is subject to change based on work location. Additional Information Work Personas We approach our distributed world of work with flexibility and trust. Work personas (flexible, remote, or required in office) are categories that are assigned to ServiceNow employees depending on the nature of their work and their assigned work location. Learn more here. To determine eligibility for a work persona, ServiceNow may confirm the distance between your primary residence and the closest ServiceNow office using a third-party service. Equal Opportunity Employer ServiceNow is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, creed, religion, sex, sexual orientation, national origin or nationality, ancestry, age, disability, gender identity or expression, marital status, veteran status, or any other category protected by law. In addition, all qualified applicants with arrest or conviction records will be considered for employment in accordance with legal requirements. Accommodations We strive to create an accessible and inclusive experience for all candidates. If you require a reasonable accommodation to complete any part of the application process, or are unable to use this online application and need an alternative method to apply, please contact [email protected] for assistance. Export Control Regulations For positions requiring access to controlled technology subject to export control regulations, including the U.S. Export Administration Regulations (EAR), ServiceNow may be required to obtain export control approval from government authorities for certain individuals. All employment is contingent upon ServiceNow obtaining any export license or other approval that may be required by relevant export control authorities. From Fortune. ©2025 Fortune Media IP Limited. All rights reserved. Used under license.
    $117k-156k yearly est. 41d ago

Learn more about security engineer jobs

How much does a security engineer earn in Oceanside, CA?

The average security engineer in Oceanside, CA earns between $87,000 and $171,000 annually. This compares to the national average security engineer range of $77,000 to $141,000.

Average security engineer salary in Oceanside, CA

$122,000
Job type you want
Full Time
Part Time
Internship
Temporary