Fulltime Information Security Analyst openings in California on September 17, 2022

Information Security Analyst at TEKsystems

Location: Rancho Cucamonga

Major Duties and Essential Functions

1.Personally, provides exceptional Member service; uses Service Standards in every work-related interaction.

2.Manages multiple information security systems, ensuring proper integration of the components with computer systems, network equipment and other devices.

3.Researches data security needs and requirements for current and future systems.

4.Performs regular vulnerability analysis for intentional and unintentional systems misuse and identifies appropriate counter measures.

5.Takes a lead autonomous role in the management of the credit unions information security program including establishing, implementing and monitoring of information security, incident response procedures and policies, system configuration standards and ongoing risk assessments.

6.Assists the credit union management team with the creation, modification, and implementation of Information Security policies and standards.

7.Performs routine audits of security databases including Active Directory, Anti-Virus, Firewall, Data Loss Prevention (DLP), Group Policy, Remote Authentication Dial-In User Server/Service (RADIUS), and regularly reviews other security logging systems. Designs and/or implements changes to these systems in response to any discovered vulnerabilities.

8.Performs regular audits of credit union procedures including new hire/transfer/separation process, configuration checklists, firewall changes, Uniform Resource Locator (URL)/Spam filter changes, DLP changes, file permission changes, inventory changes, equipment changes, and system health checks.

9.Lead role in the management of credit union patch management, anti-virus, spam filtering, DLP, URL filtering, and intrusion prevention systems.

10.Assists with the development and implementation of active directory group policy objects with an emphasis on enhancing computer systems security.

Skills:

Security, Audits, patch, management, anti, virus, spam, filtering, DLP, permissions, file, changes, intrusion, prevention, system, access, CEH, CISSP

Additional Skills & Qualifications:

Advanced knowledge of computer skills including hardware, software, operating systems and networking with a focus on information security; understanding of firewalls, proxies, SIEM, antivirus, and IDS/IPS concepts; ability to identify and mitigate network vulnerabilities and explain how to avoid them; understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact; experience with computer network penetration testing and techniques; ability to design and work with multiple linked, relational databases using advanced data management techniques and processes; development, installation, administration, troubleshooting and maintenance of large, complex computer networks; advanced knowledge of word processing, spreadsheets, presentation and database software; exposure to applications development in the Windows environment; above average interpersonal, oral and written communication skills are required to elicit requirements and communicate technical information to users effectively; problem solving and analytical skills.

About TEKsystems: We’re partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That’s the power of true partnership. TEKsystems is an Allegis Group company.

The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
Apply Here
For Remote Information Security Analyst roles, visit Remote Information Security Analyst Roles

********

IT Security Analyst at Myticas Consulting ULC

Location: Sunnyvale

The recruitment team at Myticas Consulting is looking for an experienced IT Security Analyst who would be interested in a remote full time permanent opportunity offered within the Sunnyvale, CA region.

Candidates must either be American Citizens or Permanent Residents.

Overall responsibilities:
• Perform security assessments and communicate them to stakeholders.
• Manage SIEM and lead incident response.
• Assist RD teams with ongoing security projects and report progress to stakeholders
• Participate in creating the future security roadmap for the business.

Your skills and experience

You have:
• Participated in or lead incident responses.
• Experience working with SIEM platforms (Elasticsearch, Splunk).
• Strong knowledge of Vulnerability management, Monitoring, OS hardening.

It would be nice if you also had:
• Experience with a Scripting language (python, PowerShell, etc.).
• Experience in automating security workflows (preferably Ansible).
• Strong documentation skills.
Apply Here
For Remote IT Security Analyst roles, visit Remote IT Security Analyst Roles

********

Information Security Analyst at Atrilogy Solutions Group

Location: Brea

Atrilogy’s Direct banking client is looking for an Information Security Analyst for a 1 year (Potential Full-Time Conversion) Employment for an Information Security Analyst Role.

Banking or Financial Experience is Mandatory.

The primary role of the Information Security Analyst (ISA) is to support the Information Security Officer (ISO) in managing Information Security Objectives. The focus of these objectives is to enforce and monitor user/data/system security and integrity in accordance with the Corporate Information Security Policy. On a regular basis, the ISA also acts as a coordinator during audits and testing of business continuity and disaster recovery procedures. Other assignments that correspond with the client’s compliance-based initiatives are also within the scope of the responsibilities of ISA.

For More details please reachout to schawla@atrilogy.com
Apply Here
For Remote Information Security Analyst roles, visit Remote Information Security Analyst Roles

********

IT Security Analyst at HME

Location: Carlsbad

HME has been creating innovative products for the drive-thru and pro-audio industries since 1971. From the very beginning, we’ve known these solutions would never have happened without the customer-focused people who make up our company. HME has a team environment with a culture of collaboration, learning, and growth. With subsidiaries located in California, Georgia, Missouri, Canada, UK, and China, companies around the world depend on HME for clear, reliable communication solutions. From setting the standard for drive-thru headsets and timer systems in the quick service restaurant (QSR) industry to developing professional audio equipment used in the Olympic Games, HME strives to create the newest, most innovative products on the market while providing quality care and attention to its customers. Come join our team!

The Information Security Analyst (Temporary) will be responsible for evaluating, implementing, and supporting information security technologies and procedures for our organization. This position will review systems to identify potential security weaknesses, recommend improvements to amend vulnerabilities, implement changes, and document upgrades. The Information Security Analyst will work to ensure that the company’s IT networks, applications, and infrastructure meet company standards.

What you will do in the position:
• Strong foundation/professional experience within IT Operations – Experience administering or securing VMware, Windows, firewalls etc.
• Monitor computer systems, networks, and web applications for security issues.
• Analyze IT requirements and provide objective advice on the use of IT security requirements.
• Run security applications and handle remediations.
• Assist with information security incident response and investigations.
• Assist with information security risk assessments and provide remediation recommendations where appropriate to do so.
• Work effectively as a key part of the IT team.

What you will need to succeed in this position:
• Proven work experience as an Information Security Analyst or similar role (2+ years)
• Experienced with security testing tools and techniques
• Ability to identify and mitigate security vulnerabilities
• Demonstrated knowledge and understanding of technology specifically networks, applications, and software development
• Experience with Powershell
• Cloud security experience (Azure
• Active directory
• Proficient with Windows OS and Linux
• Windows security, PCI compliance
• Understanding of NIST 800-171

Employment Type: Temporary Full-Time
Apply Here
For Remote IT Security Analyst roles, visit Remote IT Security Analyst Roles

********

Cyber Security Analyst – Associate at CACI International Inc

Location: San Diego

Job Category: Information Technology

Time Type: Full time

Minimum Clearance Required to Start: TS/SCI

Employee Type: Regular

Percentage of Travel Required: Up to 10%

Type of Travel: Local

CACI is looking for an Associate-Level Cybersecurity Systems Analyst to support our customer, the Navy Special Warfare Command (NSW), at NAB Coronado, CA. This position is contingent upon award of the USSOCOM Cybersecurity Support contract.

What You’ll Get To Do

Performs assessment and authorization coordination. Advises and assists the customer with Risk Management Framework (RMF) and develops a Plan of Action and Milestones for resolving network deficiencies in accordance with DODI 8510.01 and ICD 503. The duties of this task include assessing network compliance against controls listed in NIST 800-53 and creating A&A packages. Performs assessment, compliance, and validation of IT systems to support the Cybersecurity program at USSOCOM, its

Component Commands, TSOCs, and deployed forces. The Contractor shall execute a comprehensive assessment, compliance and validation of customer networks to ensure compliance with regulations and security and standards. The end goal is to ensure the integrity of customer systems by identifying and mitigating potential shortcomings and vulnerabilities.

Advise USSOCOM, its Component Commands, TSOCs, and deployed forces on network and system risks, risk mitigation courses of action, and operational.

Additionally, the Cybersecurity Systems Analyst should be able to perform security evaluations and vulnerability assessments using the DOD Assured Compliance Assessment Solution (ACAS), Nessus vulnerability scanning tool and Security Content Automation Protocol tool. Identify applicable STIGs and perform assessments using the Security Content Automation Protocol tool. The Cybersecurity Systems Analyst will liaison with network and system administrators to correct identified deficiencies. The Cybersecurity Systems Analyst will also scan (or review scans) for new systems and applications being introduced into the SOF environment, identify issues, and draft certification letters for the government. The contractor will liaison with the Site Integration Facility (SIF) to ensure systems and application meet the standards in the DISA Security Technical Implementation Guides (STIG).

The Cybersecurity Systems Analyst should be extremely knowledgeable of cyber network defense tools such as end point security, SIEM, comply to connect, etc.

Typical Duties Include
• Tracks A&A status of SIE governed ISs. Ensures these artifacts and documentation are available in the USSOCOM-chosen automated tool.
• Advises stakeholders on the adequacy of implementation of cybersecurity requirements.
• Provide DoD & IC RMF subject matter expertise to USSOCOM, its Component Commands, TSOCs, deployed forces and their delegates, including other Contractors, and assist with the development and execution of the RMF program at USSOCOM, its Component Commands, TSOCs, and deployed forces.
• Maintain, track, and validate DISN, cloud and DIA connection approval packages, including those from USSOCOM, its Component Commands, TSOCs, and other subordinate organizations.
• Develop and maintain supporting documentation for new and existing networks, cloud environments, information systems and technologies as they are introduced into the SIE.
• Develop and review the A&A of SIE networks, cloud environments, systems, services, telecommunication circuits, mobile devices, portable electronic devices, hardware, and software using the DoD & IC RMF to obtain an Authority to Operate (ATO), Interim Authority to Test (IATT), or Authority to Connect (ATC).
• Perform risk and vulnerability assessments of IT and IS for authorization; prepare risk assessment reports for submission to the SCA and Authorizing Official/Designated Authorizing Official/Designated Accrediting Authority (AO/DAO/DAA) in accordance with DoD, DIA, USCYBERCOM, USSOCOM, Component Command, TSOC, and deployed forces’ policies, procedures, and regulations.
• Assist USSOCOM, its Component Commands, TSOCs and deployed forces with the enforcement of A&A, as well as DoD, DIA, USSOCOM, Component Command, TSOC, and deployed forces’ connection standards for networks and systems.
• Track and maintain A&A databases, web sites and tools to ensure that networks, systems and devices are properly documented and managed from a cybersecurity perspective.
• Track and report to higher headquarters organizations (e.g. USCYBERCOM, DIA) compliance with applicable Cybersecurity regulations and directives. Ensure timely notifications are made to responsible individuals and organizations in order to prevent lapses in accreditations (e.g., 30, 60, and 90 day notices).
• Develop and maintain an Information Security Continuous Monitoring (ISCM) Plan. This plan shall address ongoing awareness of information security, vulnerabilities, security controls, and threats to support organizational risk management decisions.
• Identify, assess, and advise on cybersecurity control compliance and associated risks.
• Coordinate with USCYBERCOM, DoD, DIA, NSA, DISA, and subordinate organizations to support the resolution of issues with security, A&A, connection approvals, and waiver requests.
• Perform network, cloud, information systems, hardware, software and device security authorization and assessments, as well as the application and execution of policy, including project management support services.
• Validate the patching of systems, perform validation scanning, develop Plans of Action & Milestone (POA&Ms), and report as directed by applicable policies, procedures, and regulations.
• Provide subject matter expertise for COA development and the implementation of Cybersecurity mitigation strategies.
• Develop and implement required processes, procedures, and capabilities to mitigate vulnerabilities and weaknesses for software and hardware deployment.
• Identify, implement and validate continued effectiveness of key performance parameters and applied security measures
• Perform analytics on cybersecurity posture and provide reports to the AO/DAO and applicable stakeholders as required per ISCM and AO/DAO direction.

You’ll Bring These Qualifications
• Experience with the US Combatant Commands (USCENTCOM/USSOCOM) is desired.
• Technical background with system administration experience, architecture and engineering preferred
• Technical background in networking, identity management, Microsoft and Linux operating systems, database, and mobility
• Working knowledge of the RMF.
• Knowledge of the Telos Xacta or Enterprise Mission Assurance Support Services (eMASS) system is desired.
• Must have excellent communications skill (written and oral) and interpersonal skills.
• Knowledge and experience with DoD IA processes and policies (e.g., DODI 8510.01, NIST, CNSS and other cybersecurity policies, Chairman of the Joint Chiefs of Staff Manual (CJCSM) 65101.01, Incident Response and other IA policies).
• Active TS/SCI clearance required.

Required Education, Experience, And Certifications
• Bachelor’s Degree in technical or cyber discipline or equivalent
• 2+ years related experience.
• Current DoD 8570.01-M, DoD IAT Level II

Company Overview: At CACI, you will have the opportunity to make an immediate impact by providing information solutions and services in support of national security missions and government transformation for Intelligence, Defense, and Federal Civilian customers. CACI is an Equal Opportunity Employer – Females/Minorities/Protected Veterans/Individuals with Disabilities.

As a federal contractor, CACI is subject to any federal vaccine mandates or other customer vaccination requirements. All new hires are required to report their vaccination status.
Apply Here
For Remote Cyber Security Analyst – Associate roles, visit Remote Cyber Security Analyst – Associate Roles

********

Cyber Security Analyst at San Mateo County Transit District

Location: San Mateo

Caltrain is the commuter rail system serving San Francisco, San Mateo and Santa Clara counties that spans 77 miles and is governed by the Peninsula Corridor Joint Powers Board (PCJPB), which consists of agencies from the three Caltrain counties. Each member agency has three representatives on a nine-member Board of Directors. The member agencies are the City and County of San Francisco, SamTrans and the Santa Clara Valley Transportation Authority. Caltrain operates a fleet of 29 locomotives and 123 passenger cars. The average weekday ridership for Caltrain is over 60,000 passengers.

Currently, Caltrain is going through a modernization program, The Peninsula Corridor Electrification Project (PCEP). The electrification of the railway is a transformative change, and this is the most exciting time in the 150 year history of the railway. The primary purpose of the Project is to improve Caltrain system performance, reduce long-term environmental impact by reducing noise, improve regional air quality and reduce greenhouse gas emissions.

DIVISION Caltrain

Rail Development (Network Emgineering)

APPLICATION DEADLINE Caltrain

Continous Recruitment

Other Information Caltrain

Location: San Carlos, CA

JOB SUMMARY Caltrain

The Cybersecurity Analyst reports to the Manager, Network Engineering, and is responsible for the oversight and implementation of the Districts rail network infrastructure and provides technical and engineering design support for complex cross-functional network and cybersecurity projects within the District. Manages and develops connectivity solutions utilizing the district’s fiber optic infrastructure; develops and implements standards and procedures for the District’s PTC, PCEP, and other rail network systems; develops security policy, compliance and design strategy for the security of the District’s enterprise network and systems; works to improve the security posture of district owned sites & facilities, as well as develop threat modeling, coordination of application security requirements, and strategic application security remediation using a wide variety of hardware and software tools.

MINIMUM QUALIFICATION Caltrain

Works under the general supervision of the Manager, Network Engineering who establishes goals and objectives and evaluates performance.

MINIMUM QUALIFICATIONS: Sufficient education, training and experience to demonstrate the knowledge and ability to successfully perform the essential functions of the position. Development of the required knowledge and abilities is typically obtained through but not limited to:
• Bachelor’s degree in computer science, management information systems, information technology, or a closely related field
• Three (3) years of experience managing cyber security programs and initiatives.
• Knowledge of information system architecture and security controls, such as Firewall ACL’s and border router configurations, operating systems configurations, wireless architectures, databases, specialized appliances, and information security policies and procedures

Preferred Qualifications
• CISSP certification
• Experience managing information security control standards, including SOC2, PCI- DSS, NIST CSF, ISO 27000, or COBIT.
• Deep technical and operational understanding of TCP/IP and security protocols, network defense, and security related technologies including encryption, VPNs, firewalls, proxy services, and IDS/IPS, Windows Active Directory, VMware
• Knowledge of Cisco switch, routing, firewalls, wireless, and access/identity
• Knowledge of Security Awareness Training and Phishing Campaign applications
• Hands-on experience installing and administering security systems and tools, including firewalls, IDS/IPS, SIEM, manage antivirus/antimalware, patch management, log analyzers, network tracers, vulnerability scanners, and Group Policy
• Strong knowledge in the following areas: IAM, system virtualization, Windows and Unix Security, Cloud Security, Application Whitelisting, Vulnerability Management, endpoint security controls
• Strong working understanding and knowledge of Windows and Linux Operating Systems
• Knowledge and depth and/or breadth of expertise in informational technology disciplines e.g., network operations, databases, software application and interfaces, computer operations, production control, quality assurance and systems management.
• Excellent verbal, written, organizational, presentation, and interpersonal communications skills.

ESSENTIAL FUNC&DUTY Caltrain
• Lead the security compliance efforts and conduct periodic audits, regular penetration testing, and remediation in accordance with TSA, DHS, and CISA requirements. Take charge ensuring data security, mitigating cyber security risks, and safeguarding SMCTD’s computer networks, Operations (Train) Network and related systems against security intrusions. Responsible for coordinating and managing SMCTD’s cyber security activities, upgrade cyber security measures and controls and actively combat security intrusions.
• Plans, analyzes, and implements system security measures and controls related to SMCTD’s computer networks and other technology systems. Aligns information security activities with business risk priorities through prioritization of security risk and mitigation activities.
• Research and resolve sensitive and confidential data security issues and provide leadership or technical assistance in projects involving protection of confidential data against unauthorized access.
• Provide hands-on support for a broad spectrum of technologies, including security software running on Windows and Linux systems, network devices, virtual machines, Cloud Infrastructure as well as software-as-service (SaaS) services.
• Collaborate with internal and external stakeholders in implementing and supporting technical projects, and for operational support of production platforms. Researches and evaluates new technologies and cybersecurity management tools; develop and deliver training materials such as online OT cybersecurity awareness training and provide accurate and prompt status reports as required

Examples Of Duties
• Develops, implements, and monitors a strategic, comprehensive information security program to ensure appropriate levels of confidentiality, integrity, availability, safety, privacy, and recovery of information assets owned, controlled, or/and processed by the organization.
• Identifies, evaluates, and reports on cybersecurity risk related to assets. Performs an inventory of information assets, maintains the asset repository; manages the data classification project.
• Ensures organizational compliance in accordance with agency information security policies, standards, and procedures; responsible for the exception process, authorizes and documents all exceptions, and maintains a repository of all exceptions.
• Manages systems and network security and remote access methodologies such as Firewalls, IDS/IPS, VPN, and MFA. Perform packet analysis using tools such as NMAP, Ethereal a Wireshark; review device logs, provide event correlation, and forensic analysis; conducts regular vulnerability scanning and recommends remediation steps
• Reviews annually and coordinates any changes to the Incident Response Plan and the overall IT Security Policies/Standards. Responsible for oversight compliance with PCI Compliance and regulations. (Includes conduct annual PCI compliance exercise, security patching process and validation). Acts as a Focal point for all information security related audit work (internal & external). Coordinates with auditors in the execution of audits. Develops a strategy for handling audits and external assessment processes for relevant regulations.
• Maintain relationships with local, state, and federal law enforcement and other related government agencies to ensure that the organization maintains a strong security posture and is kept well-abreast of the relevant threats identified by these agencies.
• Provides support and consulting to the Executive Officer, IT while staying current on relevant security regulations, laws, and technologies. Monitor the external threat environment for emerging threats and advise relevant stakeholders on the appropriate courses of action.
• Perform all job duties and responsibilities in a safe manner to protect oneself, fellow employees, and the public from injury or harm. Promote safety awareness and follow safety procedures to reduce or eliminate accidents.
• Provide 24/7 on-call construction and maintenance support.
• Perform all job duties and responsibilities in a safe manner to protect one’s self, fellow employees and the public from injury or harm. Promote safety awareness and follow safety procedures in an effort to reduce or eliminate accidents.
• Perform other duties as assigned.

How To Apply Caltrain
• To apply, please visit the www.caltrain.com/about/Jobs.html. Complete an online employment application and supplemental questionnaire. This is a continuous recruitment. A resume will not be accepted in lieu of the application and supplemental questionnaire. Incomplete application will not be considered.
• The Human Resources Department will make reasonable efforts in the recruitment/examination process to accommodate applicants with disabilities upon request. If you have a need for an accommodation, please contact the Human Resources Department at (650) 508-6308.
• Caltrain celebrates diversity and is committed to creating an inclusive, and welcoming workplace environment. We are an Affirmative Action/Equal Opportunity Employer. Minorities, Women, Persons with Disabilities and Veterans are encouraged to apply.

SELECTION INCLUDES Caltrain

The process will include a panel interview and may include written and skills test assessments or supplemental questions. Only those candidates who are the most qualified will continue in the selection process. Meeting the minimum qualifications does not guarantee an invitation to continue in the process. Selected candidate must successfully complete a background investigation.

PAY RANGE -Caltrain

1,914 – $2,871 per week ($99,511 to $149,267 est. annual)

EMPLOYMENT BENEFITS Caltrain

For further benefit details please go to: https://www.smctd.com/jobs.html#benefits

Holidays: Seven (7) paid holidays, plus up to four (4) floating holidays per year

Time Off: Paid Time Off: 26 days per year

Cafeteria Plans: Medical, dental, vision care, group life insurance, and more

Transportation: Free bus transportation for employees and qualified dependents

Retirement: Social Security and California Public Employees Retirement Systems (CalPERS)
• *
• * Classic Members – 2% @ 60 benefit formula, 3 year average of highest compensation
• New Members – 2% @ 62 benefit formula, 3 year average of highest compensation
Apply Here
For Remote Cyber Security Analyst roles, visit Remote Cyber Security Analyst Roles

********

Security Compliance Analyst at UCSF Medical Center

Location: San Francisco

Job Summary

Experienced professional who knows how to apply theory and put it into practice with in-depth understanding of the professional field; independently performs the full range of responsibilities within the function; possesses broad job knowledge; analyzes problems / issues of diverse scope and determines solutions.

This position will support the incubation of the UCSF School of Medicine (SOM) Research Security Program. Security Presidential Memorandum 33 (NSPM-33) mandates the establishment of research security programs at major institutions awarded federal research funds. UCSF School of Medicine (SOM) is ranked first among US medical schools in NIH dollars awarded and receives over $1 billion in total research funding annually. The SOM Research Security Program will support our ability to conduct mission critical research safely and securely. The program will focus on elements of cyber security, including foreign travel security, insider threat awareness and identification, and, as appropriate, export control training. This position will assist with maturing the existing School of Medicine Data Security Compliance Program to comply with evolving security and compliance policies and regulations, such as NSPM-33. This position will report to the SOM Data Security Compliance Program (DSCP) Manager. This position is expected to support the SOM DSCP manager in executing the vision of the SOM Research Security Program, including but not limited to:
• Developing and maintaining security and compliance program documentation
• Supporting regular security risk assessment and risk management activities
• Facilitating remediation and escalation of identified security risks and vulnerabilities
• Providing security and compliance consultation to SOM faculty, researchers, or staff
• Responding to security questionnaire requests from funders, sponsors, or partner institutions
• Developing, organizing and tracking appropriate security awareness trainings.

2 Year Contract

Department Description

UCSF School of Medicine Technology Services is the research & development group responsible for many innovations within the school, campus, and the medical center. Our group is focused on utilizing newer technologies and practices and how they can be implemented to solve problems. We provide the following services: Advocacy & Security, Design & Solution Discovery, Business Process, and Software Engineering. The team is made of multidisciplinary professionals with diverse background, and leads an Inclusion, Diversity, Equity, and Accessibility (IDEA) program.

Required Qualifications
• Bachelor’s degree in related area and minimum three years of directly related experience and / or equivalent experience / training.
• One (1) or more years’ experience in IT security compliance, technology assurance, risk management, audit, or related discipline.
• Experience creating IT security policies, procedures, audit workpapers, or runbook documentation.
• Ability to follow department processes and procedures.
• Interpersonal skills sufficient to work effectively with both technical and non-technical personnel at various levels in the organization.
• Demonstrated skills applying security controls to computer software and hardware.

Preferred Qualifications
• Experience using IT security systems and tools. Knowledge of data encryption techniques. Experience analyzing logs for security breaches.
• Knowledge of other areas of IT, department processes and procedures.
• Experience in incident response and digital forensics including data collection, examination, and analysis.
• Demonstrated skill at administering complex security controls and configurations to computer hardware, software, and networks.
• Knowledge of computer hardware, software and network security issues and approaches.

About UCSF

The University of California, San Francisco (UCSF) is a leading university dedicated to promoting health worldwide through advanced biomedical research, graduate-level education in the life sciences and health professions, and excellence in patient care. It is the only campus in the 10-campus UC system dedicated exclusively to the health sciences. We bring together the world’s leading experts in nearly every area of health. We are home to five Nobel laureates who have advanced the understanding of cancer, neurodegenerative diseases, aging and stem cells.

Pride Values

UCSF is a diverse community made of people with many skills and talents. We seek candidates whose work experience or community service has prepared them to contribute to our commitment to professionalism, respect, integrity, diversity and excellence – also known as our PRIDE values.

In addition to our PRIDE values, UCSF is committed to equity – both in how we deliver care as well as our workforce. We are committed to building a broadly diverse community, nurturing a culture that is welcoming and supportive, and engaging diverse ideas for the provision of culturally competent education, discovery, and patient care. Additional information about UCSF is available at diversity.ucsf.edu

Join us to find a rewarding career contributing to improving healthcare worldwide.

Equal Employment Opportunity

The University of California San Francisco is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, protected veteran or disabled status, or genetic information.
Apply Here
For Remote Security Compliance Analyst roles, visit Remote Security Compliance Analyst Roles

********

Security Analyst Level3 Automotive at Lucid Motors

Location: Newark

At Lucid, we don’t just welcome diversity – we celebrate it! Lucid Motors is proud to be an equal opportunity workplace. We are committed to equal employment opportunity regardless of race, color, national or ethnic origin, age, religion, disability, sexual orientation, gender, gender identity and expression, marital status, and any other characteristic protected under applicable State or Federal laws and regulations.
Notice regarding COVID-19 protocols At Lucid, we prioritize the health and wellbeing of our employees, families, and friends above all else. In response to the novel Coronavirus all new Lucid employees, whose job will be based in the United States may or may not be required to provide original documentation confirming status as having received the prescribed inoculation (doses). Vaccination requirements are dependent upon location and position, please refer to the job description for more details. Individuals in positions requiring vaccinations may seek a medical and/or religious exemption from this requirement and may be granted such an accommodation after submitting a formal request to and the subsequent review and approval thereof by our dedicated Covid-19 Response team. To all recruitment agencies : Lucid Motors does not accept agency resumes. Please do not forward resumes to our careers alias or other Lucid Motors employees. Lucid Motors is not responsible for any fees related to unsolicited resumes.
Leading the future in luxury electric and mobility At Lucid, we set out to introduce the most captivating, luxury electric vehicles that elevate the human experience and transcend the perceived limitations of space, performance, and intelligence. Vehicles that are intuitive, liberating, and designed for the future of mobility. We plan to lead in this new era of luxury electric by returning to the fundamentals of great design – where every decision we make is in service of the individual and environment. Because when you are no longer bound by convention, you are free to define your own experience. Come work alongside some of the most accomplished minds in the industry. Beyond providing competitive salaries, we’re providing a community for innovators who want to make an immediate and significant impact. If you are driven to create a better, more sustainable future, then this is the right place for you.
We are looking for an experienced hands-on Level3 Security Analyst for our Automotive Security Operations Center to perform deep-dive investigations, performing proactive threat hunting and educate the team about the threat Intel. Help IR team in containment of the incident and collaborate with Engineering teams in implementing the mitigation plans. This individual should have the ability to work with external/internal teams and collaborates with multiple teams and help in investigating and containment of the incidents.
This is a physical location opportunity at our Newark, CA Location
• Responsibilities
• Perform incident detection, investigation and respond to incidents for Automotive Security Operation Center.
• Develop Standard Operating Procedures, Incident Response Plans for Automotive Security Operation Center.
• Perform deep-dive investigations, research and accordingly recommend the improvements in detection capabilities.
• Conduct tabletop exercises with Automotive SOC stakeholders and recommend changes, improvements in the security processes, and technologies.
• Perform Incident Reviews, document the findings and ensure remediations are reviewed and taken care of.
• Collaborate with different teams such as Software, IT Security, Safety and other teams to implement and improve automotive security posture of Lucid.
• Perform Reverse Engineering, Malware Analysis and Threat Hunting.
• Provide mentorship to junior team members.
• Work closely with larger Automotive Cyber Security team to enhance the security processes, and technologies.
• Required Qualifications
• Bachelor/Master of Engineering in Computer Science, Information Technology, Cybersecurity.
• 6-8 years of direct experience as an Automotive/Information Security analyst role.
• Professional experience in incident detection and response, malware analysis or reverse engineering.
• Minimum of 3-4 years of experience working in Tier 3 SOC environments performing security incident investigation and security incident response.
• Experience with SIEM Tools(eg: Splunk, Logrhythm).
• Experience with host and network monitoring and security tools.
• Proven ability to perform data analysis, incident investigations and root cause analysis.
• Experience with developing Standard Operating Procedures, and Incident Response Plan.
• Good understanding of Cybersecurity Frameworks such as SANs, NIST Cybersecurity frameworks.
• Proven ability to leverage Mitre ATT&CK framework, for implementing Security Monitoring & Detection controls.
• Preferred Qualifications
• Master of Engineering in Computer Science OR Information Technology OR Cybersecurity.
• Knowledge of Vulnerability Assessment processes, and tools is a plus.
• Familiarity with Threat Intelligence tools and technologies.
Apply Here
For Remote Security Analyst Level3 Automotive roles, visit Remote Security Analyst Level3 Automotive Roles

********

Cyber Security Analyst-Remote Anywhere USA at Proofpoint

Location: Sunnyvale

It’s fun to work in a company where people truly BELIEVE in what they’re doing!

We’re committed to bringing passion and customer focus to the business.

Corporate Overview

Proofpoint is a leading cybersecurity company protecting organizations’ greatest assets and biggest risks vulnerabilities in people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security and compliance solutions mitigating their most critical risks across email, the cloud, social media, and the web.

We are singularly devoted to helping our customers protect their greatest assets and biggest security risk their people. That’s why we’re a leader in next-generation cybersecurity.

The Role

This role will be at the forefront of Proofpoint’s new technologies for social media and domain security and compliance. Working with the latest SaaS technologies for analyzing data from a range of online sources, the analyst will be working to help customers and the team identify understand and respond to online incidents and risks. The successful candidate will have great interpersonal and communication skills, high technical aptitude and attention to detail. The candidate must be able to take responsibility and accept accountability for successful customer engagements. The candidate must also demonstrate Project Management skills, organization and the ability to manage numerous implementations simultaneously

Proofpoint

Your day-to-day

Data collection, In depth analysis, and presentation of data from a number of diverse sources
• Customer conversations regularly at high levels
• Briefing new and existing clients on developments in cyber security technology
• Developing and presenting reports on client cyber security risk profiles
• Seeking ways to continue to professionalize, automate or make further efficient the tool and work sets employed

What you bring to the team

Customer facing job experience including customer service, retail, or other roles requiring good customer communication skills
• Knowledge and usage of Web browsers and web-based products
• Proficiency in Microsoft Office, Google Apps, Adobe reader, etc.
• Familiarity with social media networks, email systems and domain architectures
• Drive high levels of customer satisfaction via service delivery
• Must be comfortable with presenting and explaining technology to people with less technical knowledge
• Must be able to thrive in a fast paced, high stress start-up environment
• Excellent organizational, analytical and influence skills
• Ability to work independently, ability to adapt quickly, positive attitude
• Experience with security technologies such as web security gateways, email security, or others is a plus
• Experience with Proofpoint products is a plus
• BA/BS or higher is a plus

Protecting people is at the heart of our award-winning lineup of cybersecurity solutions, and the people who work here are the key to our success. We’re a customer-focused and a driven-to-win organization with leading-edge products. We are an inclusive, diverse, multinational company that believes in culture fit, but more importantly ‘culture-add’, and we strongly encourage people from all walks of life to apply.

We believe in hiring the best and the brightest to help cultivate our culture of collaboration and appreciation. Apply today and explore your future at Proofpoint!
• 1

If you like wild growth and working with happy, enthusiastic over-achievers, you’ll enjoy your career with us!
Apply Here
For Remote Cyber Security Analyst-Remote Anywhere USA roles, visit Remote Cyber Security Analyst-Remote Anywhere USA Roles

********

Information Security Analyst – Hiring Immediately at TEKsystems

Location: Rancho Cucamonga

Major Duties and Essential Functions

1. Personally, provides exceptional Member service; uses Service Standards in every work-related interaction.

2. Manages multiple information security systems, ensuring proper integration of the components with computer systems, network equipment and other devices.

3. Researches data security needs and requirements for current and future systems.

4. Performs regular vulnerability analysis for intentional and unintentional systems misuse and identifies appropriate counter measures.

5. Takes a lead autonomous role in the management of the credit union’s information security program including establishing, implementing and monitoring of information security, incident response procedures and policies, system configuration standards and ongoing risk assessments.

6. Assists the credit union management team with the creation, modification, and implementation of Information Security policies and standards.

7. Performs routine audits of security databases including Active Directory, Anti-Virus, Firewall, Data Loss Prevention (DLP), Group Policy, Remote Authentication Dial-In User Server/Service (RADIUS), and regularly reviews other security logging systems. Designs and/or implements changes to these systems in response to any discovered vulnerabilities.

8. Performs regular audits of credit union procedures including new hire/transfer/separation process, configuration checklists, firewall changes, Uniform Resource Locator (URL)/Spam filter changes, DLP changes, file permission changes, inventory changes, equipment changes, and system health checks.

9. Lead role in the management of credit union patch management, anti-virus, spam filtering, DLP, URL filtering, and intrusion prevention systems.

10. Assists with the development and implementation of active directory group policy objects with an emphasis on enhancing computer systems security.

Skills:

Security, Audits, patch, management, anti, virus, spam, filtering, DLP, permissions, file, changes, intrusion, prevention, system, access, CEH, CISSP

Additional Skills & Qualifications:

Advanced knowledge of computer skills including hardware, software, operating systems and networking with a focus on information security; understanding of firewalls, proxies, SIEM, antivirus, and IDS/IPS concepts; ability to identify and mitigate network vulnerabilities and explain how to avoid them; understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact; experience with computer network penetration testing and techniques; ability to design and work with multiple linked, relational databases using advanced data management techniques and processes; development, installation, administration, troubleshooting and maintenance of large, complex computer networks; advanced knowledge of word processing, spreadsheets, presentation and database software; exposure to applications development in the Windows environment; above average interpersonal, oral and written communication skills are required to elicit requirements and communicate technical information to users effectively; problem solving and analytical skills.

About TEKsystems:

We’re partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That’s the power of true partnership. TEKsystems is an Allegis Group company.

The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
Apply Here
For Remote Information Security Analyst – Hiring Immediately roles, visit Remote Information Security Analyst – Hiring Immediately Roles

********

The Tech Career Guru
We will be happy to hear your thoughts

Leave a reply

Tech Jobs Here
Logo