- Search jobs
- Richmond, CA
- entry level cyber security
Entry level cyber security Jobs in Richmond, CA
Create a job alert for this search
Entry level cyber security • richmond ca
Remote Cyber Security Experts - AI Trainer ($85-$95 per hour)
MercorRichmond, California, USFront End Entry Level
Albertsons CompaniesBerkeley, CA, United StatesEntry-Level Web Researcher (Remote)
FocusGroupPanelRichmond, California, United StatesEntry Level Real Estate Agent - Coldwell Banker
Coldwell BankerBerkeley, CA, USCyber Security Engineer
Berkeley LabBay Area, California, US- Promoted
Entry-Level Executive Recruiter
Invictus Marketing SolutionsBerkeley, CA, United StatesPhlebotomy - Entry Level Training Program
Dreambound Inc.Berkeley, CaliforniaEntry Level Sales Representative
EVO PEST OFFICE LLCBerkeley, CA, USEntry-Level Executive Recruiter
IMGBerkeley, CA, USManager, Security Programs
SHSO-Sutter Health System Office-BayEmeryville, CaliforniaMid-Level / Sr Level Attorney- Antitrust & Class Action
GpacEmeryville, California, United StatesFull-Time Residential Security Agent II (Hybrid)
Global GuardianBerkeley and San Francisco, CA, USSafety Security Officer (Part-Time)
Pixar Animation StudiosEmeryville, California, United States- Promoted
Entry Level Border Patrol Agent
United States Customs and Border ProtectionEl Cerrito, CA, United States- Promoted
Entry-Level Associate
TradeJobsWorkforce94707 Berkeley, CA, USSecurity Officer
Chenega CorporationBerkeley, California, USEntry-Level Tax Preparer
Jackson Hewitt - HSFRichmond, CA, USLaunch Your Real Estate Career with Keller Williams – Entry-Level and Experienced Agents Welcome
Keller Williams/CA Realty TrainingRichmond, CA, USMid-Level Software Engineer - Semantic Data Modeling
WEX IncBay Area, CA- diagnostic radiologist (from $ 200,000 to $ 250,784 year)
- operations engineer (from $ 91,052 to $ 242,944 year)
- engineering director (from $ 155,000 to $ 240,706 year)
- psychiatrist (from $ 60,000 to $ 234,872 year)
- cyber security (from $ 99,460 to $ 225,963 year)
- front end engineer (from $ 144,627 to $ 223,950 year)
- machine learning (from $ 171,500 to $ 221,400 year)
- technical program manager (from $ 167,875 to $ 221,400 year)
- content developer (from $ 60,000 to $ 220,600 year)
- Fort Worth, TX (from $ 131,488 to $ 149,495 year)
- Fort Collins, CO (from $ 131,488 to $ 149,495 year)
- Fort Lauderdale, FL (from $ 131,488 to $ 149,495 year)
- San Mateo, CA (from $ 56,838 to $ 122,720 year)
- San Antonio, TX (from $ 56,838 to $ 122,720 year)
- San Jose, CA (from $ 56,838 to $ 122,720 year)
- San Bernardino, CA (from $ 56,838 to $ 122,720 year)
- San Francisco, CA (from $ 56,838 to $ 122,720 year)
- San Diego, CA (from $ 81,100 to $ 115,752 year)
- Salt Lake City, UT (from $ 80,000 to $ 109,528 year)
The average salary range is between $ 52,000 and $ 100,000 year , with the average salary hovering around $ 68,250 year .
Related searches
Remote Cyber Security Experts - AI Trainer ($85-$95 per hour)
MercorRichmond, California, US- Full-time
- Remote
Mercor is recruiting on behalf of a cutting-edge AI research lab building advanced AI systems for cybersecurity applications. We are seeking senior cybersecurity professionals with deep hands-on experience across both defensive (Blue Team) and offensive (Red Team) security disciplines. In this role, you will apply real-world adversarial and defensive expertise to evaluate, stress-test, and improve AI models designed to assist with threat detection, incident response, and attack simulation. Your insights will directly inform how AI systems reason about attacks, evasions, detection logic, and response workflows. This is a flexible, remote engagement ideal for experienced practitioners who have operated in enterprise, consulting, or high-security environments.
- Key Responsibilities ### Defensive (Blue Team) Contributions - Investigate and analyse real or simulated security incidents (e.g., phishing, lateral movement, ransomware, privilege escalation). - Review logs and telemetry from SIEM, EDR / XDR, firewall, cloud, and identity systems. - Apply frameworks such as MITRE ATTACK to classify adversary behavior. - Evaluate alert quality, detection rules, triage decisions, and response workflows. - Assess AI-generated investigations for technical correctness and operational realism. ### Offensive (Red Team) Contributions - Analyse attack chains including initial access, persistence, privilege escalation, lateral movement, and data exfiltration. - Simulate adversarial thinking to evaluate detection gaps and bypass techniques. - Review exploit techniques, payload behaviors, and evasion strategies. - Provide insights into attack surface analysis and real-world adversary tactics. - Stress-test AI systems against realistic red-team scenarios. ### AI Evaluation & Feedback - Provide structured reasoning explaining investigative and adversarial decisions. - Identify weaknesses in AI threat analysis and suggest improvements. - Help refine benchmarks for detection, triage, and attack simulation accuracy. * * * ## Requirements ### Experience - 5+ years in cybersecurity with experience in one or more of : - SOC Analyst (Level II / III) - Incident Responder - Detection Engineer - Threat Hunter - Red Team Operator / Penetration Tester - Security Consultant (Offensive Security) - Hands-on experience conducting or responding to real-world security incidents. * * * ### Technical Skills – Blue Team - Strong experience with : - SIEM platforms (Splunk, Sentinel, QRadar, Elastic) - EDR / XDR tools (CrowdStrike, Defender, Carbon Black) - Log analysis and event correlation - Network traffic analysis (Wireshark, Zeek, tcpdump) - Cloud security and IAM investigation experience preferred. - Familiarity with MITRE ATT&CK mapping and detection engineering. * * * ### Technical Skills – Red Team - Experience with : - Penetration testing methodologies - Adversary emulation and attack simulation - Exploitation frameworks (e.g., Metasploit, Cobalt Strike or equivalents) - Privilege escalation techniques - Lateral movement techniques - Evasion and obfuscation methods - Understanding of Active Directory attacks, phishing frameworks, and payload development is a plus. * * * ### Analytical & Communication Skills - Strong written documentation skills explaining technical reasoning. - Ability to think from both attacker and defender perspectives. - Structured, logical analysis of complex security scenarios. * * * ### Preferred Qualifications - Certifications such as : - OSCP, OSEP, CRTO (Red Team) - GCIA, GCFA, GCIH (Blue Team) - CISSP - Experience mentoring junior analysts or red team members. - Scripting proficiency (Python, PowerShell, Bash). * * * ## Why Join - Contribute to next-generation AI systems for cybersecurity. - Work at the intersection of offensive and defensive security research. - High-impact role shaping AI reasoning about real-world cyber threats. - Flexible engagement suited for senior practitioners. - Collaborate with leading AI researchers and security experts.