Principal Industrial Security Analyst
Security engineer job in San Diego, CA
RELOCATION ASSISTANCE: Relocation assistance may be available CLEARANCE TYPE: PolygraphTRAVEL: Yes, 10% of the TimeDescriptionAt Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
Northrop Grumman Mission Systems is seeking a Principal Industrial Security Analyst to support multiple programs under our Communication Solutions business unit as it relates to all applicable classified federal, contractual, customer and company requirements. The responsibilities include, but are not limited to the following: supporting a fast-paced environment; create, maintain and leverage working relationships with internal and external customers. Develops, and administers security programs and procedures for classified or proprietary materials, documents, and equipment.
Experience in program security, with knowledge of implementing a multi-disciplined security program (access control, personnel security, physical security, OPSEC etc.). Studies and implements federal security regulations that apply to company operations. Obtains rulings, interpretations, and acceptable deviations for compliance with regulations from government agencies. Prepares manuals outlining regulations, and establishes procedures for handling, storing, and keeping records, and for granting personnel and visitor's access to restricted records and materials. Conducts security education classes and related briefings. Investigates security violations and prepares reports specifying preventive action to be taken. Working knowledge of DoD 5205.07 SAP Manuals volumes 1-4, ICD 705, ICDs, and/or NISPOM applicable sponsor procedures.
Basic Qualifications:
Current Active TS/SCI Poly clearance.
In-scope investigation (T5, T5R, SSBI, SBPR, PPR) completed within last 6 years or current enrollment in Continuous Evaluation (CE) program +CI Poly
Ability to meet enhanced security requirements and obtain/maintain SAP eligibility and access.
US Citizenship Required.
5+ Years of CPSO, CSSO, or relevant experience with Bachelors; or 3+ Years CPSO, CSSO, or relevant experience with Masters; an additional 4 years of applicable work experience may be substituted for Bachelor's Degree.
Preferred Qualifications:
CDSE Industrial Security Training - FSO for Possessing Facilities, Intro to SAP, SAP Compliance, SAP Mid-Level, etc.
Experience working in Classified Lab and Manufacturing environments is a PLUS
Industrial Security Professional Certifications - SPeD SFPC, NCMS ISP, etc.
Experience with customer high side networks to include CV2, CORE, CNET, JADE, ASCEND, SIC, etc.
OPSEC and Program Protection (P2) experience.
Classification review experience.
Experience completing compliance self-inspections and supporting formal customer compliance inspections.
Experience drafting and completing corrective action plans.
Self-starter with minimal supervision.
Excellent customer service and communication skills.
Ability to work independently and follow projects through to completion.
Ability to maintain flexibility to deal with changing priorities and deadlines.
Strong working knowledge of basic office automation tool suites such as MS Office (Word, Excel, PowerPoint).
Primary Level Salary Range: $91,200.00 - $136,800.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
Auto-ApplySenior Security DevOps Engineer
Security engineer job in San Diego, CA
Software is often referred to as the "soul" of Apple's products. In this position you will play a critical role in ensuring the security of the systems and infrastructure used to manage, build, and distribute, Apple's software. You will be responsible for the rollout and operation of critical security services, development of new detections across our software stack, and assisting engineers implement changes to their software components that improve their security posture. You will need to think strategically, work cross-functionally, and help foster an environment of deep collaboration and accountability towards the success of Apple's software.
We're looking for an exceptional candidate with a proven track record in making a difference in the projects under their purview. Deep experience in security operations, detection u0026 response, and strategic long-term risk assessment. The candidate must uphold Apple's values, instilling a sense of accountability across the team, and its 24x7 operation. Passion for security and operational excellency is required. In addition to solid technical skills, candidates must also have: - Strong interpersonal and communication skills - Be a self-starters with a strong sense of personal responsibility and ownership - Comfortable with unknowns and have a learning mindset - Ability to mentor engineers
Staff Product Security Engineer (SSDL)
Security engineer job in San Diego, CA
It all started in sunny San Diego, California in 2004 when a visionary engineer, Fred Luddy, saw the potential to transform how we work. Fast forward to today - ServiceNow stands as a global market leader, bringing innovative AI-enhanced technology to over 8,100 customers, including 85% of the Fortune 500. Our intelligent cloud-based platform seamlessly connects people, systems, and processes to empower organizations to find smarter, faster, and better ways to work. But this is just the beginning of our journey. Join us as we pursue our purpose to make the world work better for everyone.
Job Description
PLEASE NOTE: This role requires a minimum of 2 days per week in our San Diego, CA ServiceNow Office. Please do not apply if you cannot meet this requirement. Thank you
The ServiceNow Security Organization (SSO):
The ServiceNow Security Organization (SSO) delivers world-class, innovative security solutions to reduce risk and protect the company and our customers. We enable our customers to migrate their most sensitive data and workloads to the cloud, accelerating our business so that we are the most trusted SaaS provider. We create an environment where our employees are proud to work and can make a positive impact
Team:
Product Security is Shifting Everywhere and holistically improving the maturity of the security program. The Secure Software Development Lifecycle (SSDL) team helps the organization measure and improve security activities. The team leads product threat modeling, helps to improve security behaviors, and manages a highly visible security champions program. The team is both highly technical and strategic.
Role:
As a Staff Product Security Engineer on the ServiceNow SSDL team, you will collaborate with developers and software architects on highly technical solutions and help the organization build secure and resilient software. You will be threat modeling software products and services to identify potential risk and participate in architectural reviews of products in development.
A key part of this position is to ensure the continued success of a large and growing security champions program. You will help mentor security champions and assist them in secure software design. As a Staff Product Security Engineer, you will help security champions be successful.
What you get to do in this role:
* Work on a wide range of technologies
* Work on complex architectural and technical challenges
* Participate in threat modeling activities
* Mentor and collaborate with development teams to adopt secure coding practices
* Work on strategic and highly visible security activities across the organization
* Be an advocate for security and participate in a security champions program
Qualifications
To be successful in this role, we need someone who has:
* Experience in leveraging or critically thinking about how to integrate AI into work processes, decision-making, or problem-solving. This may include using AI-powered tools, automating workflows, analyzing AI-driven insights, or exploring AI's potential impact on the function or industry.
* 2+ years of experience in software development
* 8+ years of experience in software security (AppSec)
* 2+ years of experience in threat modeling software applications and services
* Proficient in threat modeling methodologies such as STRIDE or PASTA and their applied use in fast-moving, iterative development lifecycles
* In-depth knowledge of common web application vulnerabilities (OWASP Top 10)
* Developer-level proficiency in one or more languages - Python, Java, JavaScript, and Golang preferred
* Working knowledge of Machine Learning and taxonomies such as BIML that categorize known attacks on machine learning models
* In-depth knowledge of software design patterns and their security considerations
* In-depth knowledge of authentication and authorization standards including OAuth, OIDC, SAML, JWT, and PASETO
* Knowledge of symmetric and asymmetric cryptography, digital signatures, PKI, TLS, and cryptographic hash functions
* Knowledge of cloud native technologies including containers, Kubernetes, and services provided by AWS, GCP, and Azure
* Knowledge of static analysis (SAST), dynamic analysis (DAST), and software composition analysis (SCA) security tools
* Knowledge of OWASP ASVS, SCVS, and related verification standards
* Ability to work collaboratively in a highly distributed team
* Ability to communicate technical concepts to business stakeholders
* A passion for security
#SecurityJobs
For positions in this location, we offer a base pay of: $155,800 to $272,700 plus equity (when applicable), variable/incentive compensation and benefits. Sales positions generally offer a competitive On Target Earnings (OTE) incentive compensation structure. Please note that the base pay shown is a guideline, and individual total compensation will vary based on factors such as qualifications, skill level, competencies, and work location. We also offer health plans, including flexible spending accounts, a 401(k) Plan with company match, ESPP, matching donations, a flexible time away plan and family leave programs.
Compensation is based on the geographic location in which the role is located and is subject to change based on work location.
Additional Information
Work Personas
We approach our distributed world of work with flexibility and trust. Work personas (flexible, remote, or required in office) are categories that are assigned to ServiceNow employees depending on the nature of their work and their assigned work location. Learn more here. To determine eligibility for a work persona, ServiceNow may confirm the distance between your primary residence and the closest ServiceNow office using a third-party service.
Equal Opportunity Employer
ServiceNow is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, creed, religion, sex, sexual orientation, national origin or nationality, ancestry, age, disability, gender identity or expression, marital status, veteran status, or any other category protected by law. In addition, all qualified applicants with arrest or conviction records will be considered for employment in accordance with legal requirements.
Accommodations
We strive to create an accessible and inclusive experience for all candidates. If you require a reasonable accommodation to complete any part of the application process, or are unable to use this online application and need an alternative method to apply, please contact ***************************** for assistance.
Export Control Regulations
For positions requiring access to controlled technology subject to export control regulations, including the U.S. Export Administration Regulations (EAR), ServiceNow may be required to obtain export control approval from government authorities for certain individuals. All employment is contingent upon ServiceNow obtaining any export license or other approval that may be required by relevant export control authorities.
From Fortune. 2025 Fortune Media IP Limited. All rights reserved. Used under license.
F-35 Information System Security Officer - (Mid-Career)
Security engineer job in San Diego, CA
What We're Doing: Lockheed Martin's, Rotary & Mission Systems (LM RMS), F-35 Cyber Security invites you to step up to one of today's most daunting challenges: the protection of exquisite government capabilities leading to warfighter supremacy against our peer and near peer adversaries. As a cybersecurity professional at Lockheed Martin, you'll safeguard the sensitive information and warfighting capabilities that our citizens and the world depend upon to protect U.S. and ally interests. Here, you'll work alongside other cybersecurity experts, related departments, and military members to support the military operational objectives by providing them with a safe and secure operating environment. In this fast-paced, real-world environment, you'll draw on all your education and experience as well as the resources of Lockheed Martin to keep these exquisite capabilities protected.
The Work:
This Information System Security Officer (ISSO) position will support the Information System Security Manager (ISSM) in developing, maintaining and overseeing the cybersecurity of assigned classified and/or unclassified F-35 systems at MCAS Miramar. Typical ISSO responsibilities include but are not limited to:
Ensuring required cybersecurity controls are implemented and validated, to include continuous monitoring actions for assigned systems.
Supporting the development and maintenance of cybersecurity related plans and procedures.
Monitoring for non-compliance, anomalous activity (i.e., threats), and effectively reporting such activity and associated risks.
Ensuring POA&Ms or remediation plans are in place for vulnerabilities identified during monitoring activity, audits, inspections, etc. and implementing, or overseeing, corrective actions.
Creating, collecting and retaining data to meet reporting requirements.
Monitoring and correlating data (i.e., events) from a variety of sources (e.g., Splunk, ELA, ePO, ACAS, etc.) to identify and mitigate threats, vulnerabilities and non-compliance.
Investigating, analyzing and responding to cyber events, incidents and non-compliance, including trend analysis, creating detailed written reports and briefing the appropriate parties.
Identifying, implementing and enforcing requirements for the proper handling and storage of Government data and electronic media.
Conducting self-inspections and preparing for customer inspections.
Interacting professionally during the enforcement of security policy and procedures.
Assigned systems may vary in classification, capabilities and complexity. Mission requirements may require other than first-shift work and additional responsibilities as assigned.
Who we are:
Lockheed Martin is a Cyber Security pioneer, partner, innovator and builder. In support of our many customers, the amazing members of our team are responsible for providing all aspects of cybersecurity support in a complex environment. In a rapidly growing enterprise, this role offers the opportunity to grow and hone the unique skills and experiences required as a cybersecurity expert to create, design and build solutions to some of the world's hardest engineering problems.
Why Join Us:
Your Health, Your Wealth, Your Life
With our employees as our top priority, we provide diverse career opportunities designed to propel development and boost agility. Our flexible schedules, competitive pay and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. At Lockheed Martin, we place an emphasis on empowering our employees by fostering innovation. We believe that by applying the highest standards of business ethics and visionary thinking, everything is within our reach - and yours as a Lockheed Martin employee. Lockheed Martin values your skills, training and education. Come and experience your future!
Final Transferable Secret security clearance; last Periodic Reinvestigation must be within the last five (5) years or enrollment in Continuous Vetting program.
Ability to obtain and maintain Special Access Program (SAP) access.
Possess a valid certification that meets or exceeds DoD 8570.01-M IAT II requirements.
Meets: CCNA-Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP
Exceeds: CASP+ CE, CCNP Security, CISA, CISSP (or Assc), GCED, GCIH, CCSP
Prior experience in a cyber workforce role, as categorized by the NICE or DoD workforce frameworks.
Prior experience as an ISSO, ISSM or related DoD Cyber Workforce Role on one or more F-35 information systems.
Prior experience ensuring compliance with applicable laws, regulations, guidance and policies as they relate to DoD cybersecurity and SAPs (e.g., DoDI 8510.01, JSIG, DoDM 5205.07, NIST SP 800 series).
Prior experience with the system authorization process, associated artifacts and their requirements (e.g., SSP, SCTM, Security CONOPs, SOPs).
Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics.
The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration.
*
At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work.
With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility.
If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications.
Other Important Information
By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Ability to work remotely
Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility.
Work Schedule Information
Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.
Security Clearance Information
This position requires a government security clearance, you must be a US Citizen for consideration.
Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $93,200 - $164,450. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer.
Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays.
(Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year.
This position is incentive plan eligible.
Pay Rate: The annual base salary range for this position in most major metropolitan areas in California, Massachusetts, and New York is $107,300 - $185,840. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer.
Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays.
This position is incentive plan eligible.
Cyber security Operations Analyst
Security engineer job in San Diego, CA
Duties and Responsibilities
Maintain and operate cybersecurity technology and and provide expertise in area of focus (e.g. Risk Assessments, Controls Engineering or Incident Response).
Collaborates with the business to understand their needs in order to tailor security offerings unique to their environment.
Uses working knowledge of IT system functionality, architecture and capabilities to effectively diagnose and troubleshoot issues with some assistance.
Conducts competitive analyses on (in-use and alternative) cyber technologies and documents recommendations for our environment.
Provides awareness and guidance within Sempra Infrastructure community on secure business processes, architecture design, and technical controls.
Maintains awareness of evolving cybersecurity threats and best practices for mitigation.
Develops procedures and guidelines for implementing information security systems and practices.
Develops and aggregates metrics to measure, monitor and report on the effectiveness of information security controls and compliance with information security policies.
Performs other duties as assigned (no more than 5% of duties).
Education
Bachelor's degree in Computer Science or other science or technology major or equivalent experience required.
Experience
Minimum of 2-5 years of direct experience within the information security field required.
In-depth experience in at least one cybersecurity discipline required.
Experience with projects of moderately sized security related initiatives to successful completion required.
Demonstrated experience in vendor selection, testing, implementation, and operations of a broad array of security technologies required.
Knowledge, Skills and Abilities
Familiarization with Endpoint protection software such as Trellix and Microsoft Defender.
Familiarization in deploying vulnerability management agents.
Experience deploying logging agents and configurations.
Knowledge of firewalls and security zone.
Experience working in an Operation Technology (OT), ICS / SCADA environment.
Experience with SCADA network protocols.
Experience with OT network monitoring tools (such as but not limited to: Dragos, Cybervision, CyberX).
Ability to take initiative and work independently when needed.
Ability to maintain, upgrade and recommend operational cybersecurity tools.
Ability to work with Cybersecurity OT Engineering to make recommendations for new tools and capabilities.
Ability to work effectively on multiple projects within a team structure and excellent written and oral communication skills.
Licenses and Certifications
Certified Information Systems Security Professional (CISSP) certification, Global Information Security Professional (GISP) certification, Global Information Assurance Certification (GIAC), Certified Information Systems Auditor (CISA), or Certified Internal Auditor (CIA) certificate preferred.
Targeted professional cybersecurity certifications (i.e. forensics and incident response) preferred.
Other Qualifications
Bilingual in English/Spanish preferred.
Information Security Engineer III
Security engineer job in San Diego, CA
Are you looking to make an impactful difference in your work, yourself, and your community? Why settle for just a job when you can land a career? At ICW Group, we are hiring team members who are ready to use their skills, curiosity, and drive to be part of our journey as we strive to transform the insurance carrier space. We're proud to be in business for over 50 years, and its change agents like yourself that will help us continue to deliver our mission to create the best insurance experience possible.
Headquartered in San Diego with regional offices located throughout the United States, ICW Group has been named for ten consecutive years as a Top 50 performing P&C organization offering the stability of a large, profitable and growing company combined with a focus on all things people. It's our team members who make us an employer of choice and the vibrant company we are today. We strive to make both our internal and external communities better everyday! Learn more about why you want to be here!
PURPOSE OF THE JOB
The purpose of the Information Security Engineer III is to design secure architectures and develop cybersecurity approaches and techniques to evaluate the security of a system or network. This position will assist with strategic initiatives for short and long-term plans to identify and reduce the attack surface across applications and systems. The position exists to monitor and defend ICW Group's technology against potential threats that jeopardize the financial growth and security goals of the Company.
ESSENTIAL DUTIES AND RESPONSIBILITIES
Monitors and defends information systems against unauthorized access, modifications and/or destruction.
Monitors cloud, on-prem, and SaaS environments for security threats using SIEM, EDR, cloud-native logging, and network telemetry.
Leads security incident response, including preparation, detection, analysis, containment, eradication, and recovery.
Researches and implements methods to remediate network and application security vulnerabilities.
Leads and participates in security architecture controls reporting, compliance audits, monthly and ad-hoc statistics and trends, and risk-focused reports including internal and 3rd party Risk Assessments.
Utilizes automated tools to identify, assess, and report security concerns, with emphasis placed on effective communication to stakeholders. Takes an active lead to inform, advise, and partner with business units to help better secure operations.
Conducts threat hunting and root-cause analysis to identify anomalous behavior, exploitation attempts, and indicators of compromise.
Investigates potential data misuse, data exfiltration, and anomalous access patterns using logs, DLP, and monitoring tools.
Leads and runs complex security related projects and resolves security related issues.
Resolves complex security projects and issues. Develops a set of security standards to respond to and recover from a security breach.
Uses advanced technologies including Intrusion Detection & Prevention Systems (IDS/IPS), Firewalls, SIEM, Antivirus, Network Packet Analyzers, Malware analysis and forensics tools to detect intrusions, breaches in compliance, etc.
Prepares and analyses system security reports by collecting, analyzing, and summarizing data and trends and makes recommendations to improve security.
Conducts threat modeling, secure design reviews, and application security assessments.
Maintains operational security posture for an information system or program to ensure information system security policies, standards, and procedures are established and followed.
Creates and updates technical security standards for assets and software.
Serves as cyber security technical subject matter expert and trainer and primary resource for the organization.
Provides information security expertise to system development teams throughout the life cycle process.
Partners with Engineering, Infrastructure, Cloud, Data, and Operations teams to embed security into system design and delivery.
Leads and conducts information security risk assessments including documenting processes, service level agreements and best practices.
Develops the overall security design, development, testing and implementation of security solutions. Recommends compliance strategies that support customer requirements and alignment to company policy.
Tracks and reports on security metrics, risk trends, and remediation progress for assigned initiatives.
Collaborates with key stakeholders on remediation strategies and follow remediation activities through closure.
Partners with project management and other internal teams in determining overall security solutions.
Executes technical and process changes required to adopt, maintain, and adjust InfoSec controls as required to manage the company's risks and align with industry best practices.
Works closely with Cloud Engineering to define secure deployment patterns, guardrails, and reusable security-approved architectures.
Works with peers in other internal groups to drive technical security risk down in targeted areas.
Takes end-to-end ownership of one or more security platforms, controls, or metrics, driving continuous improvement.
Contributes to the continual enhancement of the IT security infrastructure program through governance, core processes, leading technology, and enhancement of team's skill sets.
Coaches and educates engineers and partners to improve early detection, secure design, and shared security ownership.
EDUCATION AND EXPERIENCE
Bachelor's Degree required in Engineering, Cybersecurity, Networking, or Computer Science related discipline.
Minimum 8 years of experience working in a security engineering related role designing secure networks, systems and application architectures or equivalent combination of education and experience required.
Minimum 3-5 years of experience in AWS Cloud Security services preferred. Direct experience using advanced technologies such as Intrusion Detection & Prevention Systems (IDS/IPS), Firewalls, SIEM, Antivirus software, Network Packet Analyzers, content filtering, Malware analysis and forensics tools to detect intrusions.
Experience in cyber security role requiring knowledge of data analysis, risk assessment, risk mitigation, investigation methods, incident management concepts and practices, and policy and procedure development.
Experience with AWS Services such as AWS Identity & Access Management, AWS Organizations, AWS Security HuB, Guard Duty, CloudTrail, AWS CloudTrail.
CERTIFICATES, LICENSES, REGISTRATIONS
Certification in GSEC, CISSP, and/or Security+ preferred. AWS Certified Security - Specialty, preferred.
KNOWLEDGE AND SKILLS
Knowledge of risk assessment tools, technologies, and methodologies.
Knowledge of disaster recovery, computer forensic tools, technologies, and methods. Knowledge of enterprise security platforms.
Ability to communicate network security issues to peers and management.
Ability to read and use the results of mobile code, malicious code, and anti-virus software.
Strong understanding of endpoint security solutions to include File Integrity Monitoring and Data Loss Prevention.
Demonstrated experience as a lead engineer in the design, implementation and support in an enterprise IT environment.
Ability to combine disparate skills and thinking to craft solutions and solve complex operational problems. Ability to hypothesize on root cause of inefficiencies and then test out probable solutions against those hypotheses.
Must be able to read, write and speak English effectively.
Ability to effectively communicate/present technical information to a non-technical audience.
Ability to cross train and share information with team members.
PHYSICAL REQUIREMENTS
Office environment - no specific or unusual physical or environmental demands and employees are regularly required to sit, walk, stand, talk, and hear. Employees are required to reach with hands and arms; stoop, kneel, crouch, or crawl. Employees must occasionally lift and/or move up to 30 pounds. Employees are required to have visual acuity and be capable of operating and viewing computers and other electronic devices for extended periods of time.
WORK ENVIRONMENT
This position operates in an office environment and requires the frequent use of a computer, telephone, copier, and other standard office equipment.
We are currently not offering employment sponsorship for this opportunity.
#LI-TM1
#LI-HYBRID
The current range for this position is
$121,624.81 - $217,710.99
This range is exclusive of fringe benefits and potential bonuses. If hired at ICW Group, your final base salary compensation will be determined by factors unique to each candidate, including experience, education and the location of the role and considers employees performing substantially similar work.
WHY JOIN ICW GROUP?
• Challenging work and the ability to make a difference
• You will have a voice and feel a sense of belonging
• We offer a competitive benefits package, with generous medical, dental, and vision plans as well as 401K retirement plans and company match
• Bonus potential for all positions
• Paid Time Off with an accrual rate of 5.23 hours per pay period (equal to 17 days per year)
• 11 paid holidays throughout the calendar year
• Want to continue learning? We'll support you 100%
ICW Group is committed to creating a diverse environment and is proud to be an Equal Opportunity Employer. ICW Group will not discriminate against an applicant or employee on the basis of race, color, religion, national origin, ancestry, sex/gender, age, physical or mental disability, military or veteran status, genetic information, sexual orientation, gender identity, gender expression, marital status, or any other characteristic protected by applicable federal, state or local law.
___________________
Job Category
IT
Auto-ApplyCorporate Security Engineer
Security engineer job in San Diego, CA
Job DescriptionSaronic Technologies is a leader in revolutionizing defense autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations for the Department of Defense (DoD) through autonomous and intelligent platforms.
As a Corporate Security Engineer, you'll safeguard the systems that power Saronic's mission. You'll engineer, harden, and operate Microsoft 365 and AWS environments to meet defense-grade security requirements while protecting our people, data, and operations. You'll own the protection of every employee, system, and credential. Your work will secure the full user lifecycle by automating onboarding/offboarding, protecting remote and traveling employees, and minimizing human-targeted risks like phishing and social engineering.
You will design secure-by-default platforms, automate compliance and monitoring through cloud solutions, and ensure our environments remain resilient, frictionless, and compliant. At Saronic, security is a force multiplier; security is not a blocker. You will have the autonomy to build and the mandate to innovate, working side-by-side with engineers who are developing technology that directly supports national defense. This role is ideal for someone who wants to own security at scale, shape a defense-grade security program, and see their impact every day. You'll thrive here if you're driven by mission, biased toward action, and enjoy working in a high-trust, low-ego team that values resilience, integrity, and creativity. Key Responsibilities:
Cloud and Identity Security
Administer and secure multiple Microsoft 365 GCC High and Microsoft 365 commercial tenants and AWS GovCloud and commercial accounts to align with NIST SP 800-171, NIST CSF, and ISO 27001 standards
Configure and harden identity and access management (Entra ID, AWS IAM), data loss prevention (Purview), and conditional access policies to enforce multi-factor authentication, single sign-on, and least privilege
Implement security guardrails and automation in partnership with IT and DevOps teams using Infrastructure as Code (Terraform, Ansible, CloudFormation)
Continuously drive security automation and visibility improvements across people, process, and technology
User and Endpoint Security
Engineer and enforce secure device baselines and policies via Intune and Jamf for unified endpoint management
Configure and maintain endpoint protection platforms (Defender, CrowdStrike)
Secure the user lifecycle through automated identity and device provisioning/de-provisioning, least-privilege enforcement, remote and traveling employee protection, and anomalous behavior monitoring
Reduce phishing and user-targeted threats through identity hardening, email protections, and user awareness feedback loops
Network Security
Engineer and maintain secure network architectures across global offices, remote, and cloud environments through VPNs, network segmentation, DNS filtering, secure network connectivity, and firewall configurations
Lead vulnerability, configuration, and asset management to maintain secure baselines and visibility across all enterprise systems
Support incident response through automation, playbooks, and forensic readiness
Application Security
Harden and monitor SaaS applications through secure SaaS controls, SSO/SAML enforcement, SCIM provisioning, and least privilege
Manage shadow IT detection, vendor risk reviews, and data protection
Required Qualifications:
3+ years proven experience administering and securing Microsoft 365 through Intune + Jamf, Entra ID, Defender, Purview, and Sentinel
Hands-on experience securing AWS environments, including secure configurations of IAM, GuardDuty, CloudTrail, Config, Security Hub, and encryption/key management controls
Proven proficiency in scripting and automation (i.e., Python, PowerShell, Bash)
Familiarity with cloud and identity ecosystems (i.e., Azure, AWS, Okta, Entra ID, Active Directory)
This role requires the ability to obtain and maintain a security clearance
Preferred Qualifications:
Experience with highly regulated frameworks such as NIST SP 800-171, NIST SP 800-53, ISO 27001, or FedRAMP
Familiarity with cloud and endpoint observability and EDR tools (i.e., Defender, CrowdStrike, Sentinel, Splunk)
Demonstrated experience automating compliance and audit processes
Experience implementing and managing secure cloud architecture and controls using Infrastructure as Code tools (i.e., Terraform, CloudFormation, Ansible)
Proven ability to design and operate Zero Trust Network Access
Experience implementing network intrusion detection and response tools
Demonstrated ability to evaluate SaaS vendor security posture and integrate approved applications securely into the environment
Background in defense, aerospace, or high-assurance manufacturing
Relevant security certifications (SC-100, MS-500, MD-102, AWS Certified Security - Specialty, GCSA, GCIA, CISSP, CCSP)
Physical Demands
Prolonged periods of sitting and computer work
Occasional standing and walking within the office
Manual dexterity to operate computers and office equipment
Visual acuity to read screens and documents
Occasional reaching or lifting up to 20 pounds (e.g., equipment or supplies)
Benefits:Medical Insurance: Comprehensive health insurance plans covering a range of services Saronic pays 100% of the premium for employees and 80% for dependents Dental and Vision Insurance: Coverage for routine dental check-ups, orthodontics, and vision care Saronic pays 100% of the premium under the basic plan for employees and 80% for dependents Time Off: Generous PTO and HolidaysParental Leave: Paid maternity and paternity leave to support new parents Competitive Salary: Industry-standard salaries with opportunities for performance-based bonuses Retirement Plan: 401(k) plan Stock Options: Equity options to give employees a stake in the company's success Life and Disability Insurance: Basic life insurance and short- and long-term disability coverage Pet Insurance: Discounted pet insurance options including 24/7 Telehealth helpline Additional Perks: Free lunch benefit and unlimited free drinks and snacks in the office
This role requires access to export-controlled information or items that require “U.S. Person” status. As defined by U.S. law, individuals who are any one of the following are considered to be a “U.S. Person”: (1) U.S. citizens, (2) legal permanent residents (a.k.a. green card holders), and (3) certain protected classes of asylees and refugees, as defined in
8 U.S.C. 1324b(a)(3)
.
Saronic does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.
Network Security Analyst I
Security engineer job in San Diego, CA
Select Cyber, an Information Security recruitment specialty firm, seeks to fill the following role for our client:
Network Security Analyst I
Be part of a cutting-edge Computer Incident Response Team, (CIRT) for a fortune 500 company. We are looking for individuals that want to learn a new field and grow with the company. Training provided.
The selected candidate will be a part of the Security Operations Center (SOC) and its mission to improve the information security of our customers using a Security Information and Event Management (SIEM) tool to detect and analyze IT security incidents.
Responsibilities:
Perform the following functions as individual assignments or as part of a team:
· Monitoring client networks for signs of adversarial activity.
· Respond to alerts from various monitoring systems and platforms providing indicators for enterprise defensive measures.
· Analyze reports to understand threat campaign(s) techniques, lateral movements and extract indicators of compromise (IOCs).
· Triage potentially malicious events to determine severity and criticality of the event.
· Follow procedures to analyze and escalate security incidents which vary from customer to customer.
Experience
· 1+ years technical experience in the Information Technology field.
· Experience with Intrusion Detection & Prevention Systems (IDS/IPS) or Firewalls & Log Analysis a plus.
· Technical degree, Associate or Bachelor's degree from an accredited institution in Computer Science or information technology field preferred.
· CompTIA Network+/Security+ certifications is a plus
Cyber Engineer
Security engineer job in San Diego, CA
Job Description
Mount Indie is seeking a Senior Cyber Engineer with knowledge and experience in Network Engineering and a network architecture background in supporting resilient networks. Candidates will be responsible for providing high-quality cybersecurity engineering. In this role, the Senior Cyber Engineer will be an integral team member supporting assured Command and Control capabilities for our DoD customer within the Navy Information Warfare Systems Command (NAVWAR) in San Diego, CA.
Responsibilities:
Prepare, implement, and ensure compliance with cybersecurity policy, to include Assessment and Authorization requirements.
Plan, implement, upgrade, and/or monitor cybersecurity measures to improve cyber defense and maintain a cyber-resilient network.
Assess cybersecurity vulnerabilities for risks and propose and implement remediation actions or risk mitigation strategies.
Ensure appropriate security controls are in place that will safeguard digital files and electronic infrastructure.
Respond to computer security breaches to re-establish protections and make required reports.
Architect engineering change solutions to PMW-170 and PMW-160 systems.
Document line-by-line changes as well as WAN-level design changes.
Test and implement changes aboard ship and provide during-event support.
Provide over-the-shoulder training to ship's force (pier-side and during events).
Provide remote support to ship's force as required.
Track and prepare SRPs/ECRs with PMW-160.
Advise on policy and process interactions with PMWs.
Perform a balanced mix of hands-on engineering and architecture / documentation / process work (approximately 50/50).
Required Skills and Experience:
Three (3) years of professional experience with cybersecurity engineering for mid-level and eight (8) or more years for senior level.
Knowledge and experience in Network Engineering and network architecture background supporting Resilient Networks.
Performing Cybersecurity risk assessments on deployed Navy systems, system functions and interconnection, to the degree sufficient to provide relevant Cybersecurity input.
Providing recommended changes to the DoD and DON cybersecurity initiatives after evaluating the evolving changes and provide recommendations concerning priorities and identify policies affecting requirements criteria to support Navy cybersecurity goals and initiatives in order to develop and defend existing and future budgets, program plans, and policies.
Tracking operational changes to the DoD and DON cybersecurity initiatives and provide implementation guidance and identify policies affecting cost, schedule and performance criteria to support Navy cybersecurity goals and initiatives in order to develop and defend existing and future budgets, program plans and policies.
Enhancing the Cybersecurity strategy and governance to ensure that it is consistent with DoD and DON policies, standards, and architectures.
Providing recommendations and assistance to the Government during engineering events and with certification related functions required by NAVWAR's Information Assurance Technical Authority (IATA) mission.
Evaluating cybersecurity requirements implementation across the acquisition lifecycle to make recommendations on cybersecurity risks and mitigations in support of IPTs, both internal and external to NAVWAR.
Identifying risks associated with the development of enterprise architectures to address system-of-system cybersecurity designs, maximizing common and inheritable security controls in support of a defense-in-depth strategy through the utilization of digital engineering methods.
Tracking cybersecurity implementation across the acquisition lifecycle to make recommendations on cybersecurity risks and mitigations in support of IPTs, SETRs, Platform Technical Review Boards (PTRBs),
Configuration Control Boards (CCBs), both internal and external to NAVWAR.
Monitoring cybersecurity technical approaches to ensure consistency with the IA TA objectives.
Experience with Symantec Endpoint Protection (SEP), Cybersecurity Strategy, System-Level Continuous
Monitoring (SLCM) strategy, System Security Accreditation Plans, and System Design Specification (SDS).
Very familiar with ADNS networking.
Familiarity with Tactical Networks.
Familiarity with broadcast communication systems and routing.
Familiarity with engineering change processes in PEO C4I.
Ability to prepare accurate, easy-to-understand engineering-level documentation for proposed changes.
Education and Certification Requirements:
Bachelor's degree in Cybersecurity, Computer, Electrical, or Electronics Engineering, or Mathematics with a concentration in computer science or equivalent.
Information Assurance Management (IAM) or Information Assurance Technical (IAT) or Information Assurance System Architect and Engineer (IASAE) Level I (position-based) per DoD 8570.1M.
Citizenship and Clearance requirement:
US Citizenship required
No Dual Citizenship
Active TSSCI required
Location:
On-site
San Diego
NAVWAR
Work aboard U.S. Navy and Coalition vessels as required (underway experience helpful but not required).
Travel:
Must be willing to travel as required.
30%
Cyber Security Engineer III
Security engineer job in San Diego, CA
Location: San Diego CARequired Clearance: Secret Certifications: DoD 8570.01-M in accordance with (IAW) DFARS ************ Baseline Certification, minimum IAT Level III Required Education: Bachelor's degree in Cybersecurity, Cyber Operations, Cyber Engineering, Information System, Information Technology, Computer, Electrical, or Electronics Engineering, Software Engineering, Computer Science, Mathematics with a concentration in Computer Science, or equivalent to above disciplines Required Experience: Ten (10) years of full-time professional experience
Position Description:
PingWind is seeking the right fit to join a team of Cyber professionals as they support critical functions to provide Cyber Security for the Navy's network. You will ensure the highest level of cyber security by implementing STIGS, performing scans using tools such as ACAS, and tracking/patching/mitigating vulnerability findings. You will monitor and act upon situations involving Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS). Key goal is to ensure the warfighter can achieve their mission without the interference of adversaries and opportunistic hackers. Work is performed in support of Naval Surface Warfare Center (NSWC), DAHLGREN DIVISION in Virgina Beach as it conducts Research, Development, Test & Evaluation (RDT&E), analysis, systems engineering, integration, and certification of complex Department of Defense systems.
Primary Responsibilities:
Level III: Ten (10) years of full-time professional experience performing system hardening with demonstrated experience in the following areas:• Interrupting, implementing, tracking and reporting security measures such as STIGs and high impact vulnerability software patching• Monitoring firewalls and overall network for intrusion detection and prevention; acting on security events as they happen and reporting to senior leaders• Involvement in the Navy ATO process to ensure all security risks are removed, mitigated or avoided• Research and tackle security risks as they arise; understand the risk involved, recommend strategies to deal with them, and track/brief risks to leadership, keeping all stakeholders informed until an issue is resolved.
Required Qualifications:
• Secret• DoD 8570.01-M in accordance with (IAW) DFARS ************ Baseline Certification, minimum IAT Level III • Bachelor's degree in Cybersecurity, Cyber Operations, Cyber Engineering, Information System, Information Technology, Computer, Electrical, or Electronics Engineering, Software Engineering, Computer Science, Mathematics with a concentration in Computer Science, or equivalent to above disciplines• Combined total of ten (10) years of full-time professional experience in the following skillsets/disciplines:• Littoral Combat Ship (LCS) Total Ship Computing Environment (TSCE) experience• Computer security, military system specifications, Security Management policy guidance and directives, DoD and cybersecurity policies;• Risk Management Framework (RMF) and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, IDS, IPS, Switch/Routers, Cross Domain Solutions (CDS), EMASS and Endpoint Security Solution (ESS);• Performing STIG implementation;• Performing vulnerability assessments with the Assured Compliance Assessment Solution tool; and• Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems
Desired Qualifications/Experience:
• DoD 8570.01-M CSSP certification• RMF experience
About PingWind
PingWind is focused on delivering outstanding services to the federal government. We have extensive experience in the fields of cybersecurity, development, IT infrastructure, supply chain management and other professional services such as system design and continuous improvement. PingWind is a VA CVE certified Service-Disabled Veteran-Owned Small Business (SDVOSB) with offices in Washington DC and Northern Virginia. ****************
Our benefits include:
• Paid Federal Holidays• Robust Health & Dental Insurance Options• 401k with matching• Paid vacation and sick leave• Continuing education assistance• Short Term / Long Term Disability & Life Insurance• Employee Assistance Program through Sun Life Financial EAP Guidance Resources
Veterans are encouraged to apply
PingWind, Inc. does not discriminate in employment opportunities, terms, and conditions of employment, or practices on the basis of race, age, gender, religious or political beliefs, national origin or heritage, disability, sexual orientation, or any characteristic protected by law.
Auto-ApplyCyber Security Analyst (MSSP/SOC)
Security engineer job in San Diego, CA
Hey there, Rockstar! 🚀 We are looking for you!
At Agile IT, we help organizations thrive by making technology simple, secure, and strategic. As a trusted Microsoft partner and CMMC Registered Practitioner Organization (RPO), we specialize in guiding businesses through the complexities of cloud adoption, cybersecurity, and compliance, so they can focus on achieving their mission without being slowed down by IT challenges.
We combine deep technical expertise with a people-first approach to deliver solutions that actually work in the real world. From CMMC compliance and security to cloud migration, collaboration, and ongoing managed services, Agile IT empowers organizations to modernize with confidence and agility.
Why Work at Agile IT?
Impactful Work: Everything you touch helps to keep our nation's secrets secure while also helping our client organizations thrive, making technology a true enabler instead of a roadblock.
Culture of Growth: We're a team of curious learners and problem-solvers, and we invest in developing your expertise through training, certifications, and hands-on experience.
Flexibility & Balance: With a remote-friendly environment and a people-first approach, you get the freedom to do your best work while living your best life.
Collaborative Team: At Agile IT, you're surrounded by passionate professionals who support one another and celebrate success together.
Forward-Thinking Mindset: We stay ahead of industry shifts so our team and our clients are always future-ready.
Joining Agile IT means being part of a company that isn't just adapting to the future of IT-it's shaping it.
Job Description
At Agile IT, supporting CMMC-compliant environments means we don't just fix problems-we prevent them.
As a Security Analyst at Agile IT, you'll play a critical role in safeguarding our clients. You'll monitor and analyze security events, investigate incidents, and collaborate with senior engineers and architects to deliver world-class managed security services. This is an excellent platform to sharpen your analytical and technical skills while protecting clients in today's ever-changing threat landscape. This position is designed to nurture your career growth, providing a pathway into the dynamic and evolving field of cybersecurity operations and defense.
What you do: (major responsibilities)
Monitor and analyze security events across client environments.
Investigate alerts, perform triage, and escalate incidents when needed.
Conduct threat analysis and provide actionable recommendations to reduce risk.
Assist in incident response activities, including root cause analysis and reporting.
Tune and improve detection rules and security use cases to enhance visibility.
Communicate findings clearly to both technical and non-technical stakeholders.
Stay up to date on emerging threats, vulnerabilities, and trends.
Qualifications
What sets you apart: (qualifications-knowledge, skills, and abilities)
2+ years of experience in a SOC/NOC or MSSP in cybersecurity; OR 5+ years of experience in cybersecurity operations role.
Familiarity with SIEM tools (Sentinel, Splunk, QRadar, etc.).
Strong understanding of networking, firewalls, IDS/IPS, and endpoint protection.
Knowledge of security frameworks such as MITRE ATT&CK, NIST, or CIS Controls.
Excellent problem-solving and communication skills.
A collaborative mindset with the ability to work across teams and with customers.
Nice to have skills: (preferred skills or skills that will be expected to learn)
Certifications such as SC-200, Network+, Security+, CySA+, CEH, CISSP, or equivalent.
Experience with Microsoft Security tools (Defender, Sentinel, Purview, Entra).
Exposure to cloud platforms (Microsoft Azure, AWS, Google Cloud).
Familiarity with compliance frameworks (CMMC, NIST 800-171, HIPAA, ISO 27001).
Additional Information
A writing sample will be requested from candidates who are chosen to move forward in the interview process.
THE FINE PRINT:
Compensation and Benefits
*Pay range is $62,400 to $83,200 per year.
Starting pay is generally lower to mid-range; based on experience.
This is a remote, full-time, non-exempt position.
Medical/Dental/Vision/STD/LTD
Remote mental and physical health networks
$200,000 basic life insurance
Voluntary life
401(k) with 3% employer contribution - no vesting period
Combined 18 days PTO increasing with tenure
9 paid holidays
And so much more
*Factors in determining the appropriate compensation for a role include experience, skills, knowledge, abilities, education, licensure and certifications, and other business and organizational needs. The Hiring Pay Scale referenced in the job posting is the budgeted salary or hourly range that Agile IT reasonably expects to pay for this position.
Background checks, pre-employment aptitude, and skills testing are a mandatory part of the recruitment process. All Agile IT employees are provided with laptops and home office equipment. Due to the contractual requirements of our work with government entities, all hires must be US Citizens.
We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. All your information will be kept confidential according to EEO guidelines.
Cybersecurity Lead/Information Systems Security Officer (ISSO)
Security engineer job in San Diego, CA
Data Intelligence, LLC is seeking a highly experienced Cyber Security Lead / Information Systems Security Officer (ISSO) to support cybersecurity operations and compliance for Navy and Department of Defense (DoD) systems. This role requires deep expertise in Information Assurance (IA), cybersecurity compliance frameworks, and Navy-specific cybersecurity practices. The ideal candidate will have extensive experience working with Navy Cross Domain Solutions (NCDSO) and a strong technical background in military C4I/IT systems.
Key Responsibilities:
Serve as the Cyber Security Lead/ISSO for classified and unclassified Navy/DoD systems.
Lead Risk Management Framework (RMF) efforts in accordance with DoD 8500 Series, NIST SP 800 Series, and other applicable cybersecurity policies and guidelines.
Develop, review, and manage technical documentation including System Security Plans (SSPs), Security Assessment Reports (SARs), and Plan of Action & Milestones (POA&Ms).
Interface with the Navy Cross Domain Solutions Office (NCDSO) to support secure cross-domain solutions, including submission packages and coordination of approvals.
Provide subject matter expertise in support of system security engineering, integration, and testing.
Coordinate with system engineers, developers, and stakeholders to ensure security controls are effectively implemented.
Monitor systems for compliance with DFARS Clause ************ and other DoD IA requirements.
Assist in the preparation and review of technical instructions, engineering plans, and test-related documentation.
Maintain up-to-date knowledge of emerging cybersecurity threats, tools, and regulatory requirements.
Support system Certification and Accreditation (C&A) processes in accordance with NSA and DoD standards.
Required Qualifications:
Education:
Master's degree from an accredited college or university in Computer Science, Information Systems Management, Cybersecurity, or a related field.
Experience:
Minimum of 10 years of Navy or DoD experience in Information Assurance and Cybersecurity.
At least 5 years of recent experience (within the last 5 years) directly supporting Navy cybersecurity programs and RMF processes.
Direct experience with the Navy Cross Domain Solutions Office (NCDSO) within the last five years.
Demonstrated expertise in DoD cybersecurity requirements, including the DoD 8500 Series and NIST SP 800 Series.
Experience with engineering documentation including technical instructions, engineering plans, and systems integration documents.
Strong understanding of military C4I/IT systems, including Navy SATCOM (MILSATCOM and Commercial), Tactical Communications, and GPS systems.
High familiarity with the NSA certification process for secure systems.
Certifications:
Compliant with DFARS Clause ************ for Information Assurance Contractor Training and Certification (e.g., CISSP, CISM, Security+, or equivalent).
Security Clearance:
Must hold an active Top Secret / SCI (TS/SCI) clearance.
Preferred Skills:
Strong leadership and communication skills with the ability to brief senior stakeholders.
Ability to lead complex cybersecurity projects with minimal supervision.
In-depth knowledge of secure system design and implementation in classified environments.
Experience collaborating with cybersecurity authorities across Navy and DoD organizations.
About Data Intelligence, LLC:
Data Intelligence, LLC (DI) is a small business that provides Information Technology System Development (Agile, DevSecOps, Cloud Platform support) Cybersecurity (RMF, Security Engineering, Cross Domain Solutions), Tactical Data Link Standards Development and Testing, and Logistics/Warehousing services to U.S. federal clients both CONUS and OCONUS. DI consistently demonstrates exceptional customer service, maintains an employee-centric culture, and delivers hands-on technical expertise to help our clients achieve their mission.
Since 2005, DI has successfully provided IT Systems Engineering, Software Development, Cybersecurity, and supporting solutions and services to customers that include the Department of Defense, Intelligence, and Federal Civilian clients. Current clients include the US Navy, Air Force, Army, Marine Corps, Coast Guard, National Geospatial-Intelligence Agency, Defense Logistics Agency, and The Department of Homeland Security. DI is headquartered in Marlton, New Jersey, with satellite offices in California, Maryland, Ohio, Pennsylvania, Virginia, and Washington, D.C.
Why you should join us:
Data Intelligence offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays.
Data Intelligence is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
Information Security Analyst
Security engineer job in San Diego, CA
Requirements
Bachelor's degree in Cybersecurity, Computer Science, or related field.
3+ years of experience in information assurance or cybersecurity.
DoD 8570 IAT Level II certification (Security+ CE, CySA+, or equivalent).
Familiarity with NIST, DISA STIGs, and DoD RMF compliance.
Must possess an active Secret Clearance - Required
This contractor and subcontractor shall abide by the requirements of 41 CFR §§ 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on their race, color, religion, sex, sexual orientation, gender identity or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment individuals without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status or disability.
Salary Description $88,000-$102,000
Information Security Engineer
Security engineer job in Temecula, CA
It's fun to work in a company where people truly BELIEVE in what they're doing!
We're committed to bringing passion and customer focus to the business.
The Information Security Engineer is responsible for contributing to the corporate Information Security program by assisting in the identification, recommendation and implementation of industry leading application security tools and techniques. The incumbent will also maintain and update application security processes and procedures and train team members on any relevant updates.
This position is remote, but local to the Temecula, CA office.
Essential Functions
Assist with the development, implementation, and administration of information security policies, standards, and procedures, adhering to industry best practices
Assist in integrating regulatory compliance requirements (e.g., PCI, GLBA) into the organizational security roadmap
Assist in ensuring that the corporate IT environment is secure and complies with all external audit requirements and federal standards
Coordinate with IT Operations to ensure endpoints and network devices conform to security standards, and that security devices and controls are working as designed
Assist in the identification, evaluation and implementation of industry leading application security tools and techniques
Plan, coordinate, and implement security measures to regulate access to computer data files and prevent unauthorized modification, destruction, or disclosure of information
Perform risk assessments and execute system tests to ensure proper functioning of data processing activities and security measures
Identify potential security risks, and define and document remediation options or mitigating controls
Perform security incident investigations including: chain of custody, containment measures, root cause analysis, and identification of preventive measures
Define and assist in the management of an Incident Response Team that addresses potential or in-progress security events, establishing and adhering to escalation procedures and response times
Perform information systems evidence gathering, to support e-discovery requests and messaging searches
Perform security reviews on requests for new commercial software or material configuration changes to existing software
Perform periodic internal IT security audit functions on IT operational controls, to include system access controls, firewall rule reviews, etc.
Participate in on-call rotation
Perform related duties as requested
Essential Knowledge, Skills, & Abilities
Excellent written and verbal communication skills required
Solid presentation skills
Significant knowledge of security-oriented regulatory requirements and compliance
Excellent familiarity with IT security principles and practices including firewalling, hardening, data loss prevention, threat prevention, and identity management.
Ability to provide technical guidance to less experienced team members
Knowledge of the mortgage industry is helpful, but not required
Commitment and ability to cultivate a diverse and inclusive work environment.
Education
Bachelor's degree in computer science, Engineering, Information Systems Security or a related field is required.
Security class certifications strongly preferred
Azure certifications preferred
CISSP license preferred
Experience
5+ years of related IT experience required
2+ years in an Information Security engineering role
3+ years of experience in a regulated IT environment including some combination of SOX, HIPAA, GLBA, PCI preferred
Compensation and Benefits
Covius offers an extensive benefits package for all employees, including medical, dental, vision and 401(k)!
Compensation: $96,000 to $120,000 annually with a 10% AIP opportunity
Application Guidelines:
For best consideration, please submit your resume and application materials as soon as possible. Review of applications will begin immediately.
Working Conditions
Work is performed in a climate controlled indoor administrative office setting. The noise level in the work environment is usually quiet to moderate, depending upon the office or meeting location.
Physical Demands and Activities
While performing the duties of this job, the employee is frequently required to communicate. The employee frequently is required to remain stationary. The employee is frequently required to move about the office, operate a computer and other office machinery, such as calculator, copy machine, and computer printer; rarely position self to maintain files; rarely moves boxes weighing up to 10 lbs. Close and distance observation required with the ability to observe objects at close range in presence of glare or bright lighting (e.g., computer screen). Must possess the ability to communicate information and ideas so others will understand and have the ability to interact with external and internal stakeholders.
Covius is committed to equal opportunity in all employment practices to all qualified applicants and employees without regard to race, color, religion, gender, gender identity, age, national origin, pregnancy, disability, genetics, marital status, military or veteran status or any other protected category as established by local, state, and federal law. This policy applies to all aspects of the employment relationship including recruitment and hiring, placement, promotion, transfer, compensation, disciplinary action, layoff, leaves of absence, training, and termination. All such employment decisions will be made without unlawful discrimination based on any prohibited basis.
The essential functions, working conditions and physical demands described above are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of this position.
Please note that all s are not intended to be all-inclusive. This job description is not designed to cover all activities, duties or responsibilities that are required of the employee for this job. Employees may be required to perform other duties at any time with or without notice to meet the ongoing needs of the organization.
If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us!
Auto-ApplySr. Security Engineer
Security engineer job in Vista, CA
The Sr. Security Engineer is part of the Global IT, Security & Compliance (CISO) team, supporting security across IT, OT, and cloud environments. This role involves managing internal security platforms, partnering with our 24/7 MDR provider, responding to incidents, and integrating security into company-wide initiatives. The Senior SOC Engineer drives threat detection engineering, response automation, and security visibility across endpoints, networks, and cloud infrastructure. They are responsible for the technical leadership of SOC activities, mentoring junior engineers, optimizing integrations (Zscaler, Sentinel, Vulnerability management tools), and contributing to the global security roadmap and incident response program.
What you will do
* Lead and support internal incident management, including triage, containment, remediation, and post-incident reviews.
* Act as the primary interface with our external MDR team for alerts, investigations, and incident handling.
* Onboard and integrate new log/data sources into security monitoring.
* Monitor vulnerabilities and support patch management coordination.
* Design, manage, maintain, and optimize internal security applications such as EDR/XDR, SIEM, SOAR, IAM, PAM, vulnerability management, and DLP.
* Develop and automate operational processes, playbooks, and response workflows.
* Partner with IT, OT, and business teams to embed security into projects (cloud, infrastructure, workplace, OT).
* Support OT security initiatives, including securing industrial control systems, legacy systems, and production environments.
* Contribute to security architecture and roadmap initiatives.
* Act as a security advocate to promote best practices and raise awareness across teams.
* Design modern, user-friendly security solutions that balance usability, compliance, and risk reduction.
Qualifications
* Bachelor's degree in information security, computer science, or engineering
* Master's degree in information security, computer science, or engineering (preferred)
* 5 years' experience working in or with a SOC or MDR environment
* Strong understanding of incident response processes and digital forensics basics
* Knowledge of security frameworks and standards (ISO 27001, NIST, CIS, MITRE ATT&CK)
* Ability to design and implement modern, user-friendly security solutions that drive adoption across business and IT/OT stakeholders
* Excellent communication skills to collaborate with IT, OT, and business stakeholders
* Analytical mindset with problem-solving ability
* Relevant certifications are a plus (e.g., GCIA, GCIH, GCED, Azure Security Engineer, CISSP, Security+)
* EDR/XDR and endpoint security (Microsoft Defender)
* SIEM/SOAR administration and tuning (Microsoft Sentinel)
* Understanding of Identity and Access Management (IAM, PAM, MFA)
* Vulnerability management tools and remediation workflows
* Cloud security (Azure, AWS, GCP)
* Scripting/automation
* OT security (ICS/SCADA, IIoT, legacy systems) desirable
Base salary range: $112,640 - $154,880
Placement of new hires in this wage range is based on several factors including education, skill sets, experience, and training.
Total Rewards
We offer all Team Members a total rewards package including competitive pay, annual performance bonus, a generous benefit package with comprehensive Medical/Dental/Vision coverage, 401(k) plan with employer contribution, and paid vacation, personal and sick days.
Corporate Social Responsibility
Bachem takes responsibility for future generations by a careful handling of resources and avoiding environmental risks. We continually improve our ecological performance and develop and implement new approaches for enhancing employees' environmental awareness. EcoVadis has awarded Bachem Gold Medal status in their assessment of Bachem.
Bachem Americas is an Equal Opportunity Employer
As an equal opportunity employer, we celebrate the diversity of our team and are committed to building an inclusive workplace where individuals are hired and advanced based on merit, skills, and qualifications. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity or expression, sexual orientation, national origin, genetics, disability, age, veteran status, or other legally protected status.
Please note: unsolicited resumes from recruitment agencies will not be considered.
Share this job posting by email
Senior Security Engineer
Security engineer job in San Diego, CA
Responsibilities
Firewall management (e.g. DMZ, Internet, Third Party connections), specifically for Next Generation Firewalls
Maintenance of IPAM
Maintenance of remote access tools
Support enterprise incidents
Researches emerging threats and vulnerabilities to aid in the identification of network incidents
Analyzes data from threat and vulnerability feeds and analyzes data for applicability to the client's organization
Ensures compliance with all applicable configuration standards
Recommends security controls and/or corrective actions for mitigating technical and business risk
Produces vulnerability, configuration, and coverage metrics and reporting to demonstrate assessment coverage and remediation effectiveness
Provision and management of multi-factor authentication (e.g., token, certificate)
Malicious code detection and prevention, and Internet monitoring (e.g. IDS/IPS)
Security policy verification
Tiered web filtering (e.g., URL filtering, malicious sites, spyware, advertisements, instant messaging, free software downloads)
Internet usage reporting
Provision, installation, configuration, management, and maintenance of network intrusion detection and prevention sensors at specified network entry points
Intrusion Incident reporting
Ongoing vulnerability assessment and remediation activities
Support of Third Party security assessment, scanning and penetration testing
Design, implementation, management and maintenance of encryption solutions
Management of Client-owned security certificates, SSLs and domain names; where applicable
Logging, tracking and management of security risks and issues to Resolution and closure
Network security Services reporting per Client requirements
Remediation of discovered security risks from any security audit findings
Qualifications
· BS in Computer Science, Information Security, or a related field is highly desirable
· 7+ years of work experience in information security, especially in a network security Engineer role
· Preferred Certification - CSA+, CISSP, GIAC, PCNSA, PCNSE, PCDRA
Competencies Required
Experience with NGFW, specifically with Palo Alto and Panorama
Experience managing Infoblox
Technical expertise in analyzing threat event data, evaluating malicious activity, documenting unusual files and data, and identifying tactics, techniques and procedures used by attackers
Technical expertise in system security vulnerabilities and remediation techniques, network and web-related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, etc.)
Technical and troubleshooting expertise in security engineering, system and network security, authentication and security protocols
Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one
An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business
An understanding of organizational mission, values, and goals and consistent application of this knowledge
ISO 2700 Awareness
Auto-ApplySenior Systems Engineer - Information Assurance
Security engineer job in San Marcos, CA
What you'll do
This is a role for a Information Assurance (IA) Systems Security Engineer who is eager to contribute to a small, fast-paced team. You will have a systems architecture background to support security design and certification on U.S. Government High Assurance communications programs. Provide technical support and oversight as part of a program team's system engineering effort for IA design and development, including security architecture analysis, security requirements definition and allocation and identification of potential security vulnerabilities. Requires generation of security-related documentation per Department of Defense (DOD) standards and leading system security architecture design in a team environment. Background in High Assurance (NSA) Communications Security (COMSEC) and Transmission Security (TRANSEC) design, certification requirements and techniques are required. High Assurance Computer Security (COMPUSEC) requirements background a plus. Support for new security related business development, including proposals, white papers, and presentations, as well as interfacing with Government customers, is required.
The day-to-day
Design, documentation, implementation, prototyping, and testing of next generation encryption devices on cutting edge high speed or ultra-low power digital circuit boards for Layer 3 In-line Network Encryptors.
Developing, decomposing, linking and mapping system requirements to Hardware, Software, and Programmable Logic (FPGA) disciplines.
Authoring and reviewing Documentation required for NSA Certification, e.g. (Security Evaluation Documents, requirements documentation, Key and Certificate Management Plan (KCMP)
What you'll need
Bachelor's Degree in Engineering Discipline
8+ years communication systems design experience
Strong system, software, or test background including design and implementation
Deep understanding of system engineering processes from requirements to test with experience in managing process activities
Strong understanding of networking protocols highly desired
Must be able to prioritize, be detail oriented, and have history of managing time well to accomplish multiple tasks in parallel
Strong written and verbal communication skills, ability to work with a temporally and geographically diverse team
Ability to document and report on technical solutions/findings
Good working knowledge of MS Office products for documentation creation and modification
Desire to be part of a multidisciplinary team to evaluate and troubleshoot production related issues
Ability to work independently, take initiative, take ownership of tasks and results
US citizenship and active SECRET security clearance is required
Ability to travel up to 10%
What will help you on the job
Master's Degree in Engineering Discipline
12+ years communication systems design experience
Experience working on National Security Systems certified by NSA
Strong understanding of Risk Management Framework, Information Assurance, and Anti-Tamper techniques.
Fast and agile learner. Able to pick up new topics quickly and retain that knowledge.
Adept with Excel and Visio
US citizenship and current TOP SECRET security clearance
Industrial Security Analyst
Security engineer job in San Diego, CA
RELOCATION ASSISTANCE: No relocation assistance available CLEARANCE TYPE: SecretTRAVEL: Yes, 10% of the TimeDescriptionAt Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
Northrop Grumman Mission Systems is seeking an Industrial Security Analyst to develop, and administer security programs and procedures for classified or proprietary materials, documents, and equipment. Studies and implements federal security regulations that apply to company operations. Obtains rulings, interpretations, and acceptable deviations for compliance with regulations from government agencies. Prepares manuals outlining regulations, and establishes procedures for handling, storing, and keeping records, and for granting personnel and visitors access to restricted records and materials. Conducts security education classes and security audits. Investigates security violations and prepares reports specifying preventive action to be taken.
Basic Qualifications:
2+ years of Industrial Security experience or relevant experience with bachelors' Degree; an additional 4 years of applicable work experience may be substituted.
Current Active Secret clearance with ability to meet enhanced security requirements and obtain/maintain SAP eligibility and access.
In-scope investigation (T5, T5R, SSBI, SBPR, PPR) completed within last 6 years or current enrollment in Continuous Evaluation (CE) program.
US Citizenship required.
Excellent oral and written communication skills.
Knowledge of: DODM 5205.07 V1-4 and DISS, JADE, and/or SIMS.
Must be proficient in MS Office suite (Word, SharePoint, PowerPoint, Excel, Outlook, TEAMs).
Preferred Qualifications:
Top Secret clearance.
ICD 705 Tech Spec.
Experience with government networks CV2, CORE, JADE, etc.
Classification review experience.
Experience completing compliance self-inspections and supporting formal customer compliance inspections.
Excellent customer service and communication skills.
Ability to work in a team environment and follow projects through to completion.
Ability to maintain flexibility to deal with changing priorities and deadlines.
Willing to work extended hours, in a fast paced, deadline driven environment, excellent communication skills speaking, writing skills and organized skills enabling effective communications.
Strong working knowledge of basic office automation tool suites such as MS Office (Word, Excel, PowerPoint).
Primary Level Salary Range: $73,900.00 - $110,900.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
Auto-ApplyInformation Security Engineer III
Security engineer job in San Diego, CA
Are you looking to make an impactful difference in your work, yourself, and your community? Why settle for just a job when you can land a career? At ICW Group, we are hiring team members who are ready to use their skills, curiosity, and drive to be part of our journey as we strive to transform the insurance carrier space. We're proud to be in business for over 50 years, and its change agents like yourself that will help us continue to deliver our mission to create the best insurance experience possible.
Headquartered in San Diego with regional offices located throughout the United States, ICW Group has been named for ten consecutive years as a Top 50 performing P&C organization offering the stability of a large, profitable and growing company combined with a focus on all things people. It's our team members who make us an employer of choice and the vibrant company we are today. We strive to make both our internal and external communities better everyday! Learn more about why you want to be here!
PURPOSE OF THE JOB
The purpose of this job is to design secure architectures and develop cybersecurity approaches and techniques to evaluate the security of a system or network. This position will assist with strategic initiatives for short and long-term plans to identify and reduce the attack surface across applications and systems. The position exists to monitor and defend ICW Group's technology against potential threats that jeopardize the financial growth and security goals of the Company.
ESSENTIAL DUTIES AND RESPONSIBILITIES
Monitors and protects information assets across hybrid environments.
Monitors data flows and access events across AWS, on-prem, and SaaS platforms using DLP, CASB, SIEM, and AWS-native tools such as Macie, GuardDuty, CloudTrail, and Security Hub.
Detects and investigates data breaches, insider threats, and exfiltration attempts; leads data-centric incident response through containment, analysis, and recovery.
Implements and enforces data classification, labeling, and tagging frameworks integrated with AWS S3, RDS, and enterprise file systems.
Designs and manages encryption and key management solutions using AWS KMS, CloudHSM, and on-premise HSMs to secure data at rest and in transit.
Collaborates with development and DevOps teams to embed data protection into CI/CD pipelines and application code, ensuring secure data handling throughout SDLC.
Conducts forensic reviews and produces actionable reports, metrics, and dashboards highlighting data risks and anomalies across hybrid systems.
Leads complex data protection initiatives and resolves data security risks.
Leads enterprise data security projects, including AWS DLP implementation, sensitive data discovery, structured/unstructured data protection, and automated alerting.
Defines and enforces data governance standards for both AWS and on-prem environments, aligning to ICW's data lifecycle management and retention requirements.
Partners with database, app dev, and analytics teams to integrate encryption, tokenization, and privacy-by-design principles into application workflows.
Designs and maintains role-based and attribute-based access controls (RBAC/ABAC) across AWS Identity and Access Management (IAM), Active Directory, and application layers.
Collaborates with Privacy, Legal, and Compliance to operationalize data protection impact assessments (DPIAs) and retention/deletion automation.
Produces executive and board-level reports detailing data protection maturity, compliance metrics, and emerging risk areas.
Serves as a technical escalation point for AWS data protection incidents, third-party integrations, and complex remediation efforts.
Serves as ICW's senior data security SME and technical advisor.
Provides expert consulting to architecture, engineering, and product teams on AWS-native security services and hybrid data protection models.
Advises leadership on emerging cloud data security trends and recommends architectures that balance scalability with compliance and risk reduction.
Conducts advanced data risk assessments, privacy impact analyses, and forensic reviews to guide remediation and control design.
Defines AWS-aligned compliance strategies supporting NIST CSF, NYDFS 500, GLBA, and state privacy laws.
Evaluates and integrates modern data security solutions such as SASE/CASB platforms, insider risk analytics, and automated data classification tools.
Mentors junior engineers and fosters a data-first security mindset across ICW's engineering organization.
Partners with project management and internal teams to mature hybrid data security.
Implements technical and process controls to continuously improve data protection maturity in AWS and on-prem applications.
Partners with cloud engineering and on-prem development teams to design secure data pipelines, storage, and access control mechanisms.
Contributes to automation and orchestration of data protection activities using AWS Lambda, EventBridge, and native integration APIs.
Leads knowledge sharing on emerging AWS capabilities while ensuring backward compatibility with existing on-prem data flows.
Coaches development and data engineering teams to identify and mitigate data leakage risks during application and infrastructure design.
SUPERVISORY RESPONSIBILITIES
This position has no supervisory responsibility but may mentor and train junior engineers.
EDUCATION AND EXPERIENCE
Bachelor's Degree from four-year college or university required with major or emphasis Engineering, Cybersecurity, Networking, or Computer Science related discipline.
Minimum 8 years of experience working in a security engineering related role designing secure networks, systems and application architectures or equivalent combination of education and experience required.
Minimum 3-5 years of experience in AWS Cloud Security services preferred. Direct experience using advanced technologies such as Intrusion Detection & Prevention Systems (IDS/IPS), Firewalls, SIEM, Antivirus software, Network Packet Analyzers, content filtering, Malware analysis and forensics tools to detect intrusions.
Experience in cyber security role requiring knowledge of data analysis, risk assessment, risk mitigation, investigation methods, incident management concepts and practices, and policy and procedure development.
Experience with AWS Services such as AWS Identity & Access Management, AWS Organizations, AWS Security HuB, Guard Duty, CloudTrail, AWS CloudTrail.
CERTIFICATES, LICENSES, REGISTRATIONS
Certification in GSEC, CISSP, and/or Security+.
AWS Certified Security - Specialty, preferred
KNOWLEDGE AND SKILLS
Knowledge of risk assessment tools, technologies, and methodologies. Knowledge of disaster recovery, computer forensic tools, technologies, and methods.
Knowledge of enterprise security platforms.
Ability to communicate network security issues to peers and management. Ability to read and use the results of mobile code, malicious code, and anti-virus software.
Strong understanding of endpoint security solutions to include File Integrity Monitoring and Data Loss Prevention.
Demonstrated experience as a lead engineer in the design, implementation and support in an enterprise IT environment.
Ability to work with mathematical concepts such as probability and statistical inference.
Ability to apply principles of logical or scientific thinking to a wide range of intellectual and practical problems.
Ability to combine disparate skills and thinking to craft solutions and solve complex operational problems.
Ability to hypothesize on root cause of inefficiencies and then test out probable solutions against those hypotheses.
Ability to read, analyze, and interpret technical journals, financial reports, security analysis reports and other IT related documents.
Ability to respond to common inquiries or complaints from customers, regulatory agencies, or members of the business community.
Must be able to read, write and speak English effectively.
Ability to effectively communicate/present technical information to a non-technical audience.
Ability to cross train and share information with team members.
PHYSICAL REQUIREMENTS
Office environment - no specific or unusual physical or environmental demands and employees are regularly required to sit, walk, stand, talk, and hear. Employees are required to reach with hands and arms; stoop, kneel, crouch, or crawl. Employees must occasionally lift and/or move up to 30 pounds. Employees are required to have visual acuity and be capable of operating and viewing computers and other electronic devices for extended periods of time.
WORK ENVIRONMENT
This position operates in an office environment and requires the frequent use of a computer, telephone, copier, and other standard office equipment.
We are currently not offering employment sponsorship for this opportunity.
#LI-TM1
#LI-HYBRID
The current range for this position is
$121,624.81 - $217,710.99
This range is exclusive of fringe benefits and potential bonuses. If hired at ICW Group, your final base salary compensation will be determined by factors unique to each candidate, including experience, education and the location of the role and considers employees performing substantially similar work.
WHY JOIN ICW GROUP?
• Challenging work and the ability to make a difference
• You will have a voice and feel a sense of belonging
• We offer a competitive benefits package, with generous medical, dental, and vision plans as well as 401K retirement plans and company match
• Bonus potential for all positions
• Paid Time Off with an accrual rate of 5.23 hours per pay period (equal to 17 days per year)
• 11 paid holidays throughout the calendar year
• Want to continue learning? We'll support you 100%
ICW Group is committed to creating a diverse environment and is proud to be an Equal Opportunity Employer. ICW Group will not discriminate against an applicant or employee on the basis of race, color, religion, national origin, ancestry, sex/gender, age, physical or mental disability, military or veteran status, genetic information, sexual orientation, gender identity, gender expression, marital status, or any other characteristic protected by applicable federal, state or local law.
___________________
Job Category
IT
Auto-ApplyPlatform Security Engineer
Security engineer job in San Diego, CA
Job DescriptionSaronic Technologies is a leader in revolutionizing defense autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations for the Department of Defense (DoD) through autonomous and intelligent platforms.
Saronic Technologies is a leader in defense autonomy at sea. We're seeking a Platform Security Engineer to secure the cloud/edge where vessels, operators, and customers meet. You'll own identity and access patterns, secrets and key management, secure network posture, and policy-as-code guardrails-working across AWS (including GovCloud), Terraform infrastructure, and service code to deliver trustworthy, auditable systems.
Senior Engineers: 3+ years securing production cloud platforms (identity, secrets/KMS, network posture), preferably in autonomy, robotics, aerospace, or defense.
Staff Engineers: 8+ years including technical leadership across secure-by-default platform modules, short-lived credential issuance, and cross-account policy design; demonstrated ownership from design through operational rollout.Key Responsibilities
Design, develop, and maintain secure-by-default infrastructure on
AWS using Terraform (ALB/OIDC, IAM, KMS, Secrets Manager, Route53, VPC/SGs).
Standardize OIDC at the edge (ALB/ingress) for internal and external applications; define scopes, claims, and token lifecycles.
Own secrets and key management: KMS key policies, rotation schedules, cross-account access, and automated issuance for services and tools.
Enforce IMDSv2 required, least-privilege IAM roles, and tight security groups across modules; add CI/policy checks to prevent regressions.
Design secure protocols/APIs for service↔service and boat↔cloud communication (mTLS/TLS, certificate issuance/rotation, revocation).
Manage short-lived credentials used by fleet/overlay services; implement rotation, auditing, and incident response runbooks.
Prefer service-mediated S3 access over broad pre-signed URLs; codify bucket policies, logging, and access boundaries.
Build centralized, tamper-evident logging and audit trails; integrate detections and metrics to validate control effectiveness.
Perform threat modeling and security reviews; document patterns and drive adoption via reusable modules and guides.
Troubleshoot complex security issues in production; lead post-incident reviews and drive remediation to closure.
Stay current on cloud security best practices, especially for defense/government environments.
Required Qualifications:
Bachelor's or Master's degree in Computer Science, Software/Computer/Electrical Engineering, or a related field.
3+ years building on AWS with Terraform (ALB/ELB, IAM, KMS, Secrets Manager, Route53, VPC/SGs).
Strong knowledge of cryptographic and IAM fundamentals (key policies, rotation, certificates, OIDC/OAuth2).
Demonstrated experience enforcing IMDSv2, least-privilege roles, and network controls at scale.
Experience designing secure protocols/APIs and integrating auth into service code (e.g., Go/Rust/TypeScript).
Proven ability to perform threat modeling and conduct design/code security reviews.
Excellent problem-solving and communication skills; effective collaboration across platform, embedded, and field teams.
This role requires the ability to obtain and maintain a security clearance
Preferred Qualifications:
Experience in AWS GovCloud, multi-account landing zones, and cross-account KMS/Secrets patterns
Familiarity with fleet/overlay VPN access control and short-lived credential issuance
Policy-as-code guardrails (e.g., OPA/Conftest, Terraform validations), drift detection, and CI integration
Centralized logging/SIEM and cloud threat detection (e.g., CloudTrail, GuardDuty) with audit readiness
PKI/CA management and, ideally, hardware roots of trust (TPM/secure elements) at the edge
DoD/defense domain familiarity and prior work under export-controlled constraints
Benefits:Medical Insurance: Comprehensive health insurance plans covering a range of services Saronic pays 100% of the premium for employees and 80% for dependents Dental and Vision Insurance: Coverage for routine dental check-ups, orthodontics, and vision care Saronic pays 100% of the premium under the basic plan for employees and 80% for dependents Time Off: Generous PTO and HolidaysParental Leave: Paid maternity and paternity leave to support new parents Competitive Salary: Industry-standard salaries with opportunities for performance-based bonuses Retirement Plan: 401(k) plan Stock Options: Equity options to give employees a stake in the company's success Life and Disability Insurance: Basic life insurance and short- and long-term disability coverage Pet Insurance: Discounted pet insurance options including 24/7 Telehealth helpline Additional Perks: Free lunch benefit and unlimited free drinks and snacks in the office
This role requires access to export-controlled information or items that require “U.S. Person” status. As defined by U.S. law, individuals who are any one of the following are considered to be a “U.S. Person”: (1) U.S. citizens, (2) legal permanent residents (a.k.a. green card holders), and (3) certain protected classes of asylees and refugees, as defined in
8 U.S.C. 1324b(a)(3)
.
Saronic does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.