Fulltime Information Security Analyst openings in San Francisco Bay Area, United States on September 07, 2022

Cyber security analyst or Product Security Engineer at BuzzClan LLC

Location: San Francisco

Position: Cyber security analyst or Staff Product Security Engineer
Job Description

Position:
Cyber security analyst/Staff Product Security Engineer

Full Time Perm

Location:

– San Francisco, CA

Job Description:

We are now looking for a Staff Product Security Engineer who will be responsible for providing security guidance in cloud security and web application software design and development (App Sec); identifying, analyzing, communicating, and owning the remediation of product risks; and building automation that supports these goals.

Reporting directly to the Head of Product Security, you will use a Dev Sec Ops model and partner with embedded Security Champions to review architectures and to remediate security testing findings across the S-SDLC.

The Product Security department owns all security tools, IAST, DAST, SAST, and tracks security finding remediation by Engineering using an Application Security Posture Management platform called Armorcode.

The Staff Product Security Engineer reviews product requirements and performs risk assessments on planned cloud infrastructure/application changes.

This role requires a highly collaborative approach paired with excellent communication skills to balance trade-offs, push back, and perform negotiation to get things done.
Apply Here
For Remote Cyber security analyst or Product Security Engineer roles, visit Remote Cyber security analyst or Product Security Engineer Roles

********

NIS Cyber Security Senior Associate at PwC

Location: San Francisco

A career in Information Security, within Internal Firm Services, will provide you with the opportunity to develop and support our internal security technologies and services across the entire global and local PwC network. You’ll focus on being the forefront of designing, developing, and implementing information technology including hardware, software, and networks that enhances security of internal information and protect our firms intellectual assets.

To really stand out and make us fit for the future in a constantly changing world, each and every one of us at PwC needs to be a purpose-led and values-driven leader at every level. To help us achieve this we have the PwC Professional; our global leadership development framework. It gives us a single set of expectations across our lines, geographies and career paths, and provides transparency on the skills we need as individuals to be successful and progress in our careers, now and in the future.

As a Senior Associate, you’ll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. PwC Professional skills and responsibilities for this management level include but are not limited to:
• Use feedback and reflection to develop self awareness, personal strengths and address development areas.
• Delegate to others to provide stretch opportunities, coaching them to deliver results.
• Demonstrate critical thinking and the ability to bring order to unstructured problems.
• Use a broad range of tools and techniques to extract insights from current industry or sector trends.
• Review your work and that of others for quality, accuracy and relevance.
• Know how and when to use tools available for a given situation and can explain the reasons for this choice.
• Seek and embrace opportunities which give exposure to different situations, environments and perspectives.
• Use straightforward communication, in a structured way, when influencing and connecting with others.
• Able to read situations and modify behavior to build quality relationships.
• Uphold the firm’s code of ethics and business conduct.

Job Requirements and Preferences:

Basic Qualifications:

Minimum Degree Required:

High School Diploma

Minimum Years of Experience:

2 year(s)

Preferred Qualifications:

Degree Preferred:

Bachelor Degree

Preferred Knowledge/Skills:

Demonstrates thorough knowledge of, and/or proven record of success in, firm priorities, Network Information Security concepts, principles and standards and their application in a large enterprise environment, preferably for a global network of professional services firms, with emphasis in the following areas:
• Understanding and leveraging information security policy and procedure development and maintenance (including security awareness and role-based security training);
• Performing and maintaining formalized risk assessments;
• Maintaining Insider Threat Awareness training process;
• Implementing and overseeing a compliant Risk Management Strategy;
• Providing insight to overall security strategies and evaluating organizational progress towards agreed upon goals, and finding solutions to complex issues in order to maintain timelines and achieve project success;
• Developing and maintaining information security training and development programs;
• Creating and maintaining effective business relationships;
• Writing, communicating, facilitating and presenting cogently; to and/or for all levels of audiences, and internal staff and management;
• Developing team building skills that foster an inclusive and collaborative environment for stakeholders and team members; and,
• Collaborating with team members to create an atmosphere of trust, seeking diverse views to encourage improvement and innovation, answering questions and providing direction to less-experienced staff, coaching staff including providing timely meaningful written and verbal feedback.

Demonstrates thorough abilities, and/or proven record of success, supporting and/or coordinating Information Security Governance, preferably for a global network of professional services firms or matrixed environment, with emphasis in the following areas:
• Identifying and addressing leadership and stakeholder needs;
• Collaborating effectively with all levels of stakeholders and project resources to gather information for various project management activities, adapting strategy as needed;
• Leveraging creative thinking, problem solving, and technology (i.e., MS Office Suite, Lotus Notes, Google at Work and other firm sponsored technologies) to develop deliverables and analyses;
• Working independently on projects, influencing line manager by providing project and operational planning and implementation; and,
• Keeping team and leadership informed on progress and or issues affecting deliverables and/or the department.

For positions in Colorado, visit the following link for information related to Colorado’s Equal Pay for Equal Work Act:

All qualified applicants will receive consideration for employment at PwC without regard to race; creed; color; religion; national origin; sex; age; disability; sexual orientation; gender identity or expression; genetic predisposition or carrier status; veteran, marital, or citizenship status; or any other status protected by law. PwC is proud to be an affirmative action and equal opportunity employer.

PwC does not intend to hire experienced or entry level job seekers who will need, now or in the future, PwC sponsorship through the H-1B lottery, except as set forth within the following policy:

For positions based in San Francisco, consideration of qualified candidates with arrest and conviction records will be in a manner consistent with the San Francisco Fair Chance Ordinance.

261934

Please note that, at this time, to be in-person at a PwC office, client location or PwC-sponsored events, you must be fully vaccinated against COVID-19.

#LI-Remote
Apply Here
For Remote NIS Cyber Security Senior Associate roles, visit Remote NIS Cyber Security Senior Associate Roles

********

Sr Cloud Security Engineer at Dutech Systems Inc

Location: San Francisco

Title:
Cloud Security Engineer
Rate:
$61/hr on w2ALocation:5850 FIRST DATABANK, INC. 701 GATEWAY BOULEVARD SOUTH SAN FRANCISCO CA 94080 United States
We are looking for a Cloud Security Engineer to join our team.

As a Cloud Security Engineer, you will have a role in implementing policies and procedures that are the first line of defense against malicious actors in the IT industry.
The Day-to-Day
• Design and develop security architectures for cloud systems
• Create cloud-based programs including implementing identity and access management and securely configuring cloud environments
• Perform threat simulations and penetration tests to identify and detect possible risks
• Provide security recommendations on service design, application development and coding
• Manage cryptography and encryption of data in the cloud
• Log, monitor, and respond to detected incidents in the cloud environment
• Design and implement cloud-native architectures and designs that pose a minimal degree of risk to First Databank with appropriate security controls present
• Develop, execute and track the performance of security measures to protect information and network infrastructure and cloud systems
• Design computer security strategy and engineer comprehensive cybersecurity architecture
• Identify, define and document system security requirements and recommend solutions to management
• Configure, troubleshoot and maintain security infrastructure software
• Install software that monitors systems and networks for security breaches and intrusions
• Monitor systems for irregular behavior and set up preventive measures
• Plan, develop, implement and update company””s information security strategy
• Educate and train staff on information system security best practices
• Serve as the voice of the customer to the development teams in implementing new features or resolving security issues Your Qualifications & Skills
• College degree (or equivalent) and 10 years related work experience, required
• 10 years experience with Security Architect and/or Engineering
• 5 years experience with Cloud platforms such as Azure or Amazon Web Services (AWS)
• Experience architecting solutions within Azure or Amazon Web Services (AWS)
• Experience with assessment, development, implementation, optimization, and documentation of a comprehensive and broad set of security technologies and processes (secure software development (Application Security), data protection, cryptography, key management, identity and access management (IAM), network security) within SaaS, IaaS, PaaS, and other cloud environments.
• Working knowledge of common and industry standard cloud-native/cloud-friendly authentication mechanisms (OAuth, OpenID, etc).
• Experience with deployment orchestration, automation, and security configuration management (Jenkins, Puppet, Chef, etc) preferred.
• Experience with service-oriented architecture for cloud-based services.
• Experience working with cloud security and gov
– provided by Dice
Apply Here
For Remote Sr Cloud Security Engineer roles, visit Remote Sr Cloud Security Engineer Roles

********

Information Security Analyst​/No Remote at Hallmark Global Technologies

Location: San Jose

Position: Information Security Analyst :: San Jose, CA (No Remote)

Job Title:

Information Security Analyst

Location:

San Jose, CA (No Remote)

Duration: 12+ Months

MUST HAVE

SKILLS:

– Bachelors degree in Computer Science or related fields

– Six s of relevant work experience.

– Experience with performing security requirements analyses to secure the deployment of large globally distributed cloud-based and/or mobile-embedded platforms.

– Experience with OWASP Top 10 vulnerabilities and Cryptographic Algorithms: (PKI), X.509 Public Key Certificates, authentication protocols, and transport layer security, OID, OAuth, SAML.

– Development experience in C++/C, Swift, Java, Scala, Python or other languages and the ability to solve complex operational issues.

DESIRED

SKILLS:

– Masters degree in Computer Science or equivalent engineering experience.

– Direct experience with implementing Security Services and tools in AWS such as Guard Duty, Macie, Cloud Trail, Cloud Watch, KMS, Compute (e.g., EC2, GCE)..

– Experience with storage technologies such as: S3, Networking: VPC, IDS/IPS, WPA, firewalls, reverse proxies, Load Balancers, Security Groups/List.

– Experience with configuration tools: AWS Config, AWS Inspector, SDK/CLI. Vulnerabilities tools:
Prisma Cloud, Crowdstrike, etc.

– Experience Container Security experience with Docker, ECS, Kubernetes.

– Experience with configuration languages/IaaC: JSON, Cloud Formation Terraform

– Experience with SDLC for mobile platforms including use of obfuscation techniques, Reverse Engineering and Tamper Resistant software development on Mobile Platform.

– Understanding of various types of Exploits, Threat Modeling, and aces

– Experience with IT Security Frameworks such as NIST, ISO
27001, PCI, DSS, FedRAMP

– One or more of the following certifications: AWS Certified Solutions Architect (professional), AWS Certified Security (Specialty), CSA Certificate of Cloud Security Knowledge (CCSK), ISC2 Certified Cloud Security Professional (CCSP), CISSP.

Job Title:

Information Security Analyst

Location:

San Jose, CA (No Remote)

Duration: 12+ Months

MUST HAVE

SKILLS:

– Bachelors degree in Computer Science or related fields

– Six s of relevant work experience.

– Experience with performing security requirements analyses to secure the deployment of large globally distributed cloud-based and/or mobile-embedded platforms.

– Experience with OWASP Top 10 vulnerabilities and Cryptographic Algorithms: (PKI), X.509 Public Key Certificates, authentication protocols, and transport layer security, OID, OAuth, SAML.

– Development experience in C++/C, Swift, Java, Scala, Python or other languages and the ability to solve complex operational issues.

DESIRED

SKILLS:

– Masters degree in Computer Science or equivalent engineering experience.

– Direct experience with implementing Security Services and tools in AWS such as Guard Duty, Macie, Cloud Trail, Cloud Watch, KMS, Compute (e.g., EC2, GCE)..

– Experience with storage technologies such as: S3, Networking: VPC, IDS/IPS, WPA, firewalls, reverse proxies, Load Balancers, Security Groups/List.

– Experience with configuration tools: AWS Config, AWS Inspector, SDK/CLI. Vulnerabilities tools:
Prisma Cloud, Crowdstrike, etc.

– Experience Container Security experience with Docker, ECS, Kubernetes.

– Experience with configuration languages/IaaC: JSON, Cloud Formation Terraform

– Experience with SDLC for mobile platforms including use of obfuscation techniques, Reverse Engineering and Tamper Resistant software development on Mobile Platform.

– Understanding of various types of Exploits, Threat Modeling, and aces

– Experience with IT Security Frameworks such as NIST, ISO
27001, PCI, DSS, FedRAMP

– One or more of the following certifications: AWS Certified Solutions Architect (professional), AWS Certified Security (Specialty), CSA Certificate of Cloud Security Knowledge (CCSK), ISC2 Certified Cloud Security Professional (CCSP), CISSP.
Apply Here
For Remote Information Security Analyst​/No Remote roles, visit Remote Information Security Analyst​/No Remote Roles

********

Senior Lead Cyber Security Research Consultant at Wells Fargo

Location: San Francisco

About This Role

Wells Fargo is seeking a Senior Lead Cyber Security Research Consultant red teamer to build a world-class red teaming capability at Wells Fargo. The successful Cyber Security Strategist will lead the enterprise’s efforts in adopting and maintaining a system-wide view of threat-driven risks, with the goal of working with senior management to control these risks. The following skills are relevant for this position:
• Systems thinking
• Systems Analysis
• Game theory
• War gaming
• Intelligence analysis
• Writing and presenting
• Risk Assessment
• Controls Effectiveness
This position will interact directly with the Offensive Security Application Research Team and indirectly with our application, technology infrastructure teams including the development and software pipeline teams.

The ideal candidate will have extensive experience in conducting research, utilizing attack methods, and evolving Tactics, Techniques, and Procedures (TTPs) for exposing issues with our application stack. The position will require regular interface with external entities including cyber threat intelligence organizations, financial industry contacts, and government agencies. Interaction with internal partners including legal, fraud, financial crimes, technology and line of business leaders and executives will be required.

Responsibilities
• Oversee the development of red teaming methods and activities within and across the enterprise, to include (but not limited to) the areas of business continuity, emergency management, supply chain security, information security, personnel security, operations security, and facilities security.
• Work closely with our Technology Infrastructure (TI) partners to surface issues with our SDLC workflow.
• Develop and manage a threat intelligence program to address threats relevant to the areas listed above.
• Build and maintain a comprehensive model of relevant, feasible threats to the enterprise.
• Educate senior management regarding the strengths, weaknesses, opportunities, and threats associated with strategic red teaming.
• Provide regular threat/risk briefings to senior management regarding issues raised by the red team. Present findings within a context of overall risk to the enterprise. Adjust red team activities and agenda based on senior management input.
• Work closely with existing infrastructure and security teams, both to receive input and to provide practical and actionable intelligence.
• Act as an adversarial counterpoint to security strategy proposals.
• Help build, hire, and retain top talent to shape a world-class red team. Taken as a whole, this team (or teams) should represent expertise across a complete range of the enterprise’s functions.
In this role, you will:
• Apply advanced data analysis techniques, including machine learning, statistics and data mining to solve core business challenges, capture cyber security requirements and translate them into solutions
• Build prototypes and proof of concepts, pilot systems, and optimize databases in support of program operational, business, and strategic requirements development process
• Conduct research and identify technologies to address capability gaps for emerging cyber threats, attack methods and evolving tactics, techniques, and procedures
• Integrate new architectural analysis of cyber security features and relate existing system to future needs and trends
• Embed advanced forensic tools and techniques for attack reconstruction, and provide engineering recommendations
• Provide oversight and guidance to a team in responding to and resolving critical cyber security events and consult leadership with the decisions related to business process, security controls, policies and standards, regulations and investment prioritization
• Set the strategy and direction for advanced cyber security incident response and threat detection for the company
• Collaborate and influence all levels of professionals including managers
• Lead team to achieve objectives
Required Qualifications, US:
• 7+ years of Cyber Security Research experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
• 7+ years of information security reporting and analysis experience
• 5+ years of experience in one or a combination of the following: reporting, analytics, or modeling in an information security environment, information technology environment, or a combination of both
Desired Qualifications:
• 7 years of experience conducting red team assessments of high-consequence systems.
• 7+ years of cyber security incidents and events investigation experience
• 7+ years of Incident Response Protocols and Tools experience
• Cross-functional security experience in at least two of the areas listed above.
• Thorough understanding of concepts and principles related to security, strategy, management, and intelligence analysis.
• Ability to work productively with a variety of stakeholders (and their associated, sometimes conflicting) interests within the enterprise.
• Ability to work with and against internal resistance, and, as necessary, build consensus for red teaming within the enterprise.
• Ability to think and act both strategically and tactically, theoretically and pragmatically.
• Ability to collaborate and share knowledge within a fast-moving, multifaceted enterprise environment.
Job Expectations:
• Ability to travel up to 15% of the time
We Value Diversity

At Wells Fargo, we believe in diversity, equity and inclusion in the workplace; accordingly, we welcome applications for employment from all qualified candidates, regardless of race, color, gender, national origin, religion, age, sexual orientation, gender identity, gender expression, genetic information, individuals with disabilities, pregnancy, marital status, status as a protected veteran or any other status protected by applicable law.

Employees support our focus on building strong customer relationships balanced with a strong risk mitigating and compliance-driven culture which firmly establishes those disciplines as critical to the success of our customers and company. They are accountable for execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), which includes effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, timely and effective escalation and remediation of issues, and making sound risk decisions. There is emphasis on proactive monitoring, governance, risk identification and escalation, as well as making sound risk decisions commensurate with the business unit’s risk appetite and all risk and compliance program requirements.

Candidates applying to job openings posted in US: All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.

Candidates applying to job openings posted in Canada: Applications for employment are encouraged from all qualified candidates, including women, persons with disabilities, aboriginal peoples and visible minorities. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process.

Reference Number

R-154590-16
Apply Here
For Remote Senior Lead Cyber Security Research Consultant roles, visit Remote Senior Lead Cyber Security Research Consultant Roles

********

Senior Security Engineer – Incident Response at AppLovin

Location: Palo Alto

AppLovin’s leading marketing software platform provides app developers with a powerful, integrated set of solutions to solve their mission-critical functions like user acquisition, monetization and measurement. AppLovin is headquartered in Palo Alto, California with several offices globally.

AppLovin was named one of the Hottest Adtech Companies of 2021 by Business Insider, as well as a Certified Great Place to Work in 2021 and 2022. Fortune recognized AppLovin as one of the Best Workplaces in the Bay Area 2022, alongside The San Francisco Business Times and Silicon Valley Business Journal who have also awarded AppLovin one of the Bay Area’s Best Places to Work for the past four years. Our team members are regularly recognized for their work and leadership, including recent award wins for San Francisco Business Times’ Outstanding LGBTQ+ Leaders 2022, Business Insider’s Rising Stars of Adtech 2022, Glassdoor’s Top CEOs 2019, and the Women in Content Marketing Awards 2021.

AppLovin is seeking a Senior Security Engineer who is driven to work on some of the most challenging security problems (Cloud vulnerabilities, Network Security, Incident response). You will use your skills to secure products running on large and complex technology stacks. The ideal candidate will be a good communicator and team player, know how to explain complex issues with simple terms, focus on network security, incident response and develop appropriate tools.
About The Role:

• Experience performing computer security incident detection & response activities
• Knowledge and understanding of malware, attacker tactics, techniques, and procedures
• Knowledge of common application/system vulnerabilities, threat actors and mitigations
• Identify security risks and propose mitigation strategies
• Lead the response to security events, and then implement systems to prevent the same event from recurring or automate the security response
• Engage with internal teams to provide security guidance and feedbackImplement and manage security tools for security monitoring and incident response
• Experience with using forensic analysis tools in an incident response contextEnforce security best practices through automation
• Write effective security response playbooksEnsure that security solutions are acquired, configured and implemented correctly
• Perform various audits of all network security devices to ensure compliance with company and industry standards
• Provide support by performing troubleshooting which may include, but not necessarily be limited to: problem recognition, root cause analysis, research, isolation, resolution, follow-up, and documentation
• Create new ways to solve existing production security issues
• Understand vulnerability testing results, risk analyses and security assessments
• Flexibility to participate in a 24/7 on-call rotation

About You:

• 5+ years of experience on a security team, coordinating responses to production security incidents
• Someone who can automate security responses
• Experience developing security tools using common toolsets and programming languages
• A solid understanding of Linux and networking security fundamentals
• An expert on cloud security tools
• AWS, Azure or Google Cloud experience
• Solid understanding of networking protocols such as TCP/UDP, SSL/TLS, IPSec, etc
• Deep understanding of security principles including encryption, authentication, etc

Nice to Have:
• Experience in Python and/or Ruby
• Experience with Kubernetes
• Design and build security for GCP
• Work closely with infrastructure and product teams to ensure that they have secure-by -default systems

AppLovin is an equal opportunity employer and considers qualified applicants without regard to race, gender, sexual orientation, gender identity or expression, genetic information, national origin, age, disability, medical condition, religion, marital status or veteran status, or any other basis protected by law.
Apply Here
For Remote Senior Security Engineer – Incident Response roles, visit Remote Senior Security Engineer – Incident Response Roles

********

Sr. Principal Cyber Info. Systems Security Analyst at Northrop Grumman

Location: Fairfax

Sr. Principal Cyber Info. Systems Security Analyst
• Category: Information Technology
• Location:

Fairfax, Virginia, United States of America
• Clearance Type: SCI
• Telecommute: No
– Teleworking not available for this position
• Shift: 1st Shift (United States of America)
• Travel

Required:

Yes, 10% of the Time
• Positions Available: 1
At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people’s lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be front of many technological advancements in our nation’s history – from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon.

We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work — and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they’re making history.

Cybersecurity Professionals, We Want You! Cyber assets everywhere are under siege from a wide spectrum of threats. Almost daily, these threats grow in sophistication, breadth and speed. At Northrop Grumman, we take a holistic approach to cybersecurity, looking e cyber landscape of people, processes and technology and the whole security realm of offense, defense, and exploitation. Thought leadership demands nothing less.

We are seeking experienced Information Systems Security Professionals across the country to support classified information systems lifecycle activities.

Responsibilities will include, but are not limited to:
• Perform assessments of systems and networks within the networking environment or enclave and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy. This is achieved through passive evaluations such as compliance audits and active evaluations such as vulnerability assessments.
• Establishes strict program control processes to ensure mitigation of risks and supports obtaining certification and accreditation of systems. Includes support of process, analysis, coordination, security certification test, security documentation, as well as investigations, software research, hardware introduction and release, emerging technology research inspections and periodic audits.
• Assist in the implementation of the required government policy (i.e. ICD-503, JSIG), make recommendations on process tailoring, participate in and document process activities.
• Perform analyses to validate established security requirements and to recommend additional security requirements and safeguards.
• Support the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results and preparation of required reports.
• Complete all associated Assessment and Authorization activities, which includes all RMF Body Of Evidence (BOE) documentation:
System Security Plan (SSP), Security Controls Traceability Matrix (SCTM), Control Family Security Operating Plans (SOPs), Continuous Monitoring (Con Mon) Plan, Plan of Actions and Milestones (POA&M), etc
• Perform recurring cybersecurity SOW to include auditing, configuration management, user training, POA&M updates, Con Mon checklists, Self-Inspections, etc.

Northrop Grumman has fantastic opportunities for your career growth. If you are ready to solve complex problems in a dynamic environment, apply today!

Basic Qualifications:
• Must have , at minimum, a Master’s degree with 7 years of relevant experience; OR a Bachelor’s degree with 9 years of relevant experience; OR an Associate’s degree with 11 years of relevant experience; OR a High School Diploma/GED with 13 years of relevant experience is required
• Must have a DoD 8570 IAM level III or above security certification (examples: CISM, GSLC, or CISSP) ity to obtain this certification within 6 months of starting.
• Must have a current Top Secret/SCI Security Clearance and willingness to take a CI Polygraph

Preferred

Qualifications:
• ICD 503 knowledge/experience preferred
• RMF knowledge/experience preferred
• NIST 800-53 knowledge/experience preferred

Salary Range: $125,800 USD – $188,600 USD

Employees may be eligible for a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.

The health and safety of our employees and their families is a top priority. The company encourages employees to remain up-to-date on their…
Apply Here
For Remote Sr. Principal Cyber Info. Systems Security Analyst roles, visit Remote Sr. Principal Cyber Info. Systems Security Analyst Roles

********

SOC Security Analyst – Technology at Allied Universal

Location: Sunnyvale

Position: SOC Security Analyst – Technology Company
Allied Universal®, North America’s leading security and facility services company, provides rewarding careers that give you a sense of purpose. While working in a dynamic, diverse and inclusive workplace, you will be part of a team that fuels a culture that will reflect in our communities and customers we serve.

We offer medical, dental and vision coverage, life insurance, 401K, employee assistance programs, company discounts, perks and more for all full-time positions!

Location:

Sunnyvale, CA
Schedule:
Full Time Day Shift
Friday – Tuesday 8:00am – 4:00pm
Perks:
Competitive Pay, Weekly Pay, Growth Opportunities, and Benefits Package
Pay: $23.47 / Hr

The SOC (Security Operations Center) Security Analyst will be assigned to furthering the security mission within the client’s Regional Security Operations Center (RSOC) and Global Security Operations Center (GSOC). The SOC Security Analyst is responsible for delivering operations within the GPS control room across all client sites in the respective region. They will work with the client’s leadership to ensure operational best practice to ensure the physical safety and security of our people, buildings, and assets.
As a SOC Security Analyst, you will serve and safeguard clients in a range of industries such as Commercial Real Estate, Healthcare,

Education , Government and more.

Responsibilities:

Provide customer service to our clients by carrying out safety and security procedures, site-specific policies and when appropriate, emergency response activities
Respond to incidents and critical situations in a calm, problem solving manner
Conduct regular and random patrols around the business and perimeter. Working environments and conditions may vary by client site.

Execute RSOC and GSOC standard operating procedures, operating the SOC, in shift patterns as required
Provide a high level of service to local and remote client sites and staff with the emphasis on the security and safety of client staff, assets and information
Monitor operational network video cameras; operate all SOC technologies including network video, access control, etc.
Coordinate direct action and responses to incidents and alarm activation
Compile reports for the SOC Shift Manager in order to share with GPS management on a daily/weekly/monthly basis; provide high quality written and verbal reports as and when required
Take telephone enquiries; maintain accurate logs of events
Actively monitor and respond to critical systems alarms such as physical security systems alarms, fire panels, etc.
Deliver world-class Global Security services by understanding and working closely with technical security implementations and incident management programs
Serve as an initial point of contact in emergency situations which may affect the health and safety of employees
Communicate effectively and appropriately with internal and external responders during critical incidents
Foster cross organizational relationships to encourage risk information sharing across the business
Provide exceptional customer service by anticipating needs, offering suggestions, and exceeding expectations
Monitor several screens, systems, and events simultaneously, with the ability to shift priorities as needed

Minimum Requirements:

Must possess a minimum of two (2) years of security operations experience or previous experience working in a Global Security, Command, or similar 24×7 operations center environment
Must possess experience in basic security analysis, problem solving, handling preliminary inquiries, incident assessment, and triaging reports
High proficiency in using IT applications, data entry and retrieval, and keyboard skills to a speed of at least 25wpm with at least 75% accuracy
Basic knowledge of some technical elements associated with security systems such as IP networks, servers, LAN/WAN
Basic working knowledge of data protection policies such as GDPR and the need to keep sensitive information secure

Ability to remain calm under pressure and respond to incidents, particularly in emergencies, in a professional, resilient and timely manner with minimal supervision where appropriate
Evidence of continuous professional development (CPD)
Demonstrated ability to take initiative, successfully handle and prioritize multiple competing assignments and effectively manage deadlines.

Must be highly proficient and fully functional in all Microsoft Office applications and able to effectively utilize all available office management technology
Professional, articulate and able to use good independent judgment and discretion.

Must have proven ability to maintain correspondence, discussions and materials in strictest confidence.

Must be able to work overtime as needed.
Current state driver’s license, clean driving record (no points in prior 3 years), minimum level of insurance as required by Company policy, and ability to safely operate a vehicle required
Professional, articulate and able to use good independent judgment and discretion
Outstanding verbal and written…
Apply Here
For Remote SOC Security Analyst – Technology roles, visit Remote SOC Security Analyst – Technology Roles

********

The Tech Career Guru
We will be happy to hear your thoughts

Leave a reply

Tech Jobs Here
Logo