- COLSA Corporation (San Miguel, CA)
- …that combines ISSO responsibilities with traditional Security Operations Center (SOC) and Threat Analyst functions. The position is pivotal in maintaining the ... support system owners, and lead the documentation, authorization, and ongoing assessment of information systems. Requires working on-site and as needed during… more
- SMX (San Diego, CA)
- …to Operate (ATO)** for all supported systems, conduct network monitoring, vulnerability management, incident response, security enforcement, and threat analysis, ... Information Security Analyst - Journeymanat SMX(View all jobs) (https://www.smxtech.com/careers/) San...processes and **POA&M** tracking and resolution + Navy's Security Assessment and Authorization ( **SAA** ) policies + Knowledge… more
- SAIC (El Segundo, CA)
- **Description** SAIC is seeking you, our latest experienced **Intel Analyst ** to serve as a subject matter expert in the developing, deploying, and sustaining a ... systems architecting and engineering activities based upon analysis related to threat awareness, force protection, indications and warnings, mission planning, target… more
- The County of Los Angeles (Los Angeles, CA)
- …defense-in-depth security modeling, data center network security, cyber-analytics including threat detection and response, secure access and endpoint protection); ... access, email security, secure endpoint, network security, application security, or vulnerability management. *Experience at the level of Los Angeles County's class… more
- TELUS Agriculture & Consumer Goods (CA)
- …functions, cloud infrastructure, and corporate infrastructure development + Hands on Threat modeling, security risk assessment experience is a plus ... across a number of the noted areas of security: Vulnerability Management: + Gather and document service and product...information from application and system owners to assist in threat risk analysis. + Support security solutions to secure… more
- Naval Facilities Engineering Command (Port Hueneme, CA)
- …adversary activities. You will analyze security related events to provide a threat -based security assessment and initiate a cyber-incident response as necessary. ... to determine potential and actual intrusions; 3) Evaluating the need for threat and vulnerability assessments, systems change proposals, etc.; 4) Applying… more