Talent.com

Information security analyst Jobs in Carlsbad, CA

Last updated: 3 days ago
Chief Information Security Officer

Chief Information Security Officer

Gemological Institute of AmericaCarlsbad, California
$190,000.00–$250,000.00 yearly
Full-time
GIA is the world’s foremost authority in gemology.GIA is a global organization with headquarters located in Carlsbad, CA. GIA in Carlsbad boasts a 17-acre ocean view campus that accommodates approxi...Show moreLast updated: 30+ days ago
OPEN : Senior Information System Analyst

OPEN : Senior Information System Analyst

Rodan Energy Solutions889 Brock Rd. (Hybrid – 2 days remote), CA
Remote
We are currently requesting resumes for the following position.Senior Information System Analyst.Tuesday, August 27, (5 : 00PM EST). The role requires an individual with IBM Mainframe experience with...Show moreLast updated: 30+ days ago
Information Architecture

Information Architecture

University of TorontoSt. George, CA
DutiesAssistance with course administration (labs, grading assignments, tests, exams), and other duties as assigned.Duties may include class attendance and 1 hour office hour after each major assig...Show moreLast updated: 7 days ago
Information Security Manager

Information Security Manager

CRESCENT SOLUTIONSCalifornia, US
Reporting to the Chief Information Security Officer (CISO), the Information Security Manager is responsible for information security policy assessments, enforcing compliance with my clients securit...Show moreLast updated: 30+ days ago
  • Promoted
Sr Financial Analyst - Cloud Delivered Security Solutions

Sr Financial Analyst - Cloud Delivered Security Solutions

Palo Alto NetworksSanta Clara County, California, USA
$97,000.00–$156,000.00 yearly
Palo Alto Networks is looking for an experienced finance leader to provide decision support as the Senior Financial Analyst CDSS. Reporting to the Senior Manager of CDSS Finance this role will ser...Show moreLast updated: 12 days ago
  • Promoted
Logistics Analyst - Clearance Required - Security Clearance Required

Logistics Analyst - Clearance Required - Security Clearance Required

General Dynamics - ITPoint Mugu, California
$97,750.00–$132,250.00 yearly
Full-time +1
GDIT is seeking a Logistics Analyst Advisor to help support our MCSIL program.A Logistics Analyst is needed to join our growing MCSIL program in Point Mugu, California. You will collaborate with pro...Show moreLast updated: 13 days ago
Information Security - Information Security Engineer 3 - Contingent

Information Security - Information Security Engineer 3 - Contingent

MindlanceRemote, CA
Remote
Job Description : In this contingent resource assignment, you may : Consult on or participate in moderately complex initiatives and deliverables within Information Security Engineering and contribute...Show moreLast updated: 30+ days ago
  • Promoted
Information System Security Officer (ISSO) - (TS / SCI Required)

Information System Security Officer (ISSO) - (TS / SCI Required)

ViasatCarlsbad, CA, United States
$119,000.00–$161,000.00 yearly
At Viasat, we're on a mission to deliver connections with the capacity to change the world.For more than 35 years, Viasat has helped shape how consumers, businesses, governments and militaries arou...Show moreLast updated: 17 days ago
Security Analyst

Security Analyst

Emonics LLCCalifornia, United States
Rancho Cucamonga ☐CRC San Bernardino ☐CRC Riverside ☐ CRC Victorville.Under the direction of the Manager, Information Security Operations, the Engineer III –Security Analyst will use subject matter...Show moreLast updated: 30+ days ago
  • Promoted
INFORMATION TECHNOLOGY DIRECTOR

INFORMATION TECHNOLOGY DIRECTOR

C&M Legal Search, LLCCA, United States
$180,000.00–$210,000.00 yearly
Full-time
Information Technology Director.Information Technology, Computer Science, or a related field, with an advanced degree preferred. The ideal candidate should have a minimum of 7 years of IT leadership...Show moreLast updated: 3 days ago
Information Systems Administrator (Systems Analyst)

Information Systems Administrator (Systems Analyst)

KBRPoint Mugu, California
Full-time
Information Systems Administrator (Systems Analyst).Information Systems Administrator (Systems Analyst).This position requires on-site presence. Remote or Tele-Work is not available.Responsible for ...Show moreLast updated: 30+ days ago
Information Security Analyst (Journeyman)

Information Security Analyst (Journeyman)

Dynamic Solutions Technology LLCCA, USA
Quick Apply
Dynamic Solutions Technology, LLC.IT and Service needs for commercial and government clients.This position is to provide support in the. Serves as a team member providing network monitoring and scan...Show moreLast updated: 30+ days ago
Information System Security Officer

Information System Security Officer

Lockheed MartinCalifornia
$81,000.00–$152,600.00 yearly
Temporary
Interim Secret clearance required prior to start with ability to obtain Secret clearance.Classified Cybersecurity ISSOs help secure lifesaving products and critical state-of-the-art engineering and...Show moreLast updated: 29 days ago
Principal Information Security Architect - Enterprise Technology

Principal Information Security Architect - Enterprise Technology

Highmark HealthCA, Working at Home, California
$199,800.00 yearly
Full-time
The Principal Information Security Architect – Enterprise Technology serves as the most senior security architect and advanced technology analyst in the company. The incumbent synthesizes and simpli...Show moreLast updated: 30+ days ago
WTRS - Security Specialist (Industrial Security Analyst 4) - 19768

WTRS - Security Specialist (Industrial Security Analyst 4) - 19768

Huntington Ingalls IndustriesCarlsbad, CA, California, United States
Full-time
Employment Type : Full Time / Salaried / Exempt.Live, Virtual, Constructive Solutions.HII’s Mission Technologies division. As a trusted partner to our military customers, we design, develop and operate s...Show moreLast updated: 30+ days ago
Information Security Governance Specialist

Information Security Governance Specialist

N. Harris Computer Corporation - USARemote, CA
Remote
Full-time
Harris is a leading provider of financial management and Customer Information Systems (CIS) software solutions; providing feature-rich and robust turnkey solutions to Public Sector, Schools, Utilit...Show moreLast updated: 30+ days ago
Security Analyst

Security Analyst

Merit ServicesCA
$17.00–$22.00 hourly
Full-time
Are you someone who has a deep interest in cybersecurity and protecting important assets.If so, we invite you to join our team at Merit Safeguard in Vancouver as a Security Analyst.In this role, yo...Show moreLast updated: 30+ days ago
Information Security Endpoint Engineering Manager

Information Security Endpoint Engineering Manager

95-2566122 First American Title Insurance CoG,California Home
$94,800.00–$152,900.00 yearly
Full-time
Join a team that puts its People First! Since 1889, First American (NYSE : FAF) has held an unwavering belief in its people. They are passionate about what they do, and we are equally passionate abou...Show moreLast updated: 30+ days ago
Chief Information Security Officer

Chief Information Security Officer

Gemological Institute of AmericaCarlsbad, California
30+ days ago
Salary
$190,000.00–$250,000.00 yearly
Job type
  • Full-time
Job description

The Company : GIA is the world’s foremost authority in gemology. GIA is a global organization with headquarters located in Carlsbad, CA. GIA in Carlsbad boasts a 17-acre ocean view campus that accommodates approximately 800 of its 3,000 total employees worldwide. It offers many competitive health benefits that promotes the well-being of its employees as well as that of the environment. Discover more about GIA's innovative history by clicking .

What to expect :

  • Hybrid role (3 days on-site) at our Carlsbad, CA headquarters
  • We offer competitive medical, dental & vision
  • Matching 401-K plans up to 8%, no vesting required
  • Paid vacation, sick and holidays, tuition assistance, commuter benefits
  • On-site café

JOB OVERVIEW

The Chief Information Security Officer (CISO) is primarily responsible for establishing, implementing, monitoring, and enforcing the Institute's information security governance, standards, and policies. The incumbent will develop strategic direction and oversee the day-to-day execution of operational information security initiatives at GIA. The CISO will report to the Chief Information & Technology Officer (CITO) and collaborate closely with the other Executives and Managers within the organization to ensure the integration and efficacy of security initiatives. The CISO will provide quarterly reports to the Audit and Risk Committee of the Board of Governors.

Secure access to information assets is critical to achieve business objectives. The CISO is responsible for establishing and maintaining information security capabilities that ensure that information assets and associated technology, applications, systems, infrastructure, and processes are adequately protected in the digital ecosystem in which we operate. The CISO ensures that information systems are maintained in a fully functional and secure mode and are compliant with legal, regulatory, and contractual obligations. The CISO is responsible for identifying, evaluating, and reporting on legal, regulatory, IT, and cybersecurity risks to information assets while supporting and advancing business objectives. A key element of the CISO's role is working with executive management to determine acceptable levels of risk for the organization and resulting information security requirements.

The CISO proactively works with business units and ecosystem partners to implement practices that meet agreed-on policies and standards for information security and improve organizational awareness and understanding of operational information security risks and practical mitigations. The ideal candidate should have a strong knowledge of IT and be capable of overseeing various cybersecurity and risk management activities. This role is crucial for ensuring technology-dependent business processes achieve their desired outcomes. The CISO will work closely with the CITO and the IT organization to achieve these goals.

KEY ACCOUNTABILITIES AND RESPONSIBILITIES

Establish Vision, Strategy, and Governance

  • Develop an information security vision and strategy aligned with organizational priorities to enable and facilitate the organization's business objectives. Ensure buy-in and mandate from the board, CITO, executive team, and enterprise risk committee.
  • Facilitate an information security governance structure by implementing a governance program in alignment with the Enterprise Risk Management Committee.
  • As part of a strategic enterprise risk management program, provide regular reporting on the current status of the information security program to the Enterprise Risk Committee and the Audit and Risk Committee of the Board of Governors, thus supporting business outcomes.
  • Establish, implement, and monitor policies, standards, systems, and controls to ensure appropriate confidentiality, integrity, availability, safety, privacy, and recovery of information assets owned, managed, and processed by the organization.
  • Ensure the relevance of vision and strategy through continued knowledge acquisition. Build and nurture external networks consisting of industry peers, ecosystem partners, vendors, and other relevant parties to address common trends, findings, incidents, and cybersecurity risks.
  • Lead the Organization

  • Lead the information security function across the Institute to ensure consistent and high-quality information security management in support of the business goals.
  • Lead the information security team, ensuring (1) the acquisition, retention and development of the skills and experiences that advance our organization’s overall information security capabilities; (2) effective collaboration with stakeholders; and (3) an environment of inclusion, growth and accountability in support of business objectives.
  • Determine the information security approach and operating model in consultation with stakeholders and align with the risk management approach and compliance monitoring of non-digital risk areas.
  • Create the necessary internal networks among the information security team and line-of-business executives, as well as corporate compliance, audit, physical security, legal, and HR management teams, to ensure alignment as required.
  • Liaise with the IT architecture team to establish alignment between security and enterprise architectures, ensuring that information security requirements are inherently incorporated into these architectures and that security is designed in.
  • 3.Build and Embed Capabilities in the Organization

  • Work with the IT vendor management team and business leaders to ensure that information security requirements are included in contracts by liaising with legal affairs, vendor management, and procurement organizations.
  • Create and manage a targeted information security awareness training program for all employees, contractors, and approved system users, and establish metrics to measure the effectiveness of this security training program for different audiences.
  • Understand and interact with related disciplines through committees to consistently apply policies and standards across all technology projects, systems, and services, including privacy, risk management, compliance, and business continuity management.
  • Provide clear risk-mitigating directives for projects with components in IT, including the mandatory application of controls.
  • Provide the appropriate information security policies, practices, and guidelines to ensure that security is embedded in the project delivery process.
  • Work effectively with Laboratory, Education, Research and Instrumentation to facilitate information security risk assessment and risk management processes, and empower them to own and accept the level of risk they deem appropriate for their specific risk appetite.
  • 4.Operate the Information Security function

  • Manage the cost-effective information security organization, consisting of direct reports and dotted-line reports (such as individuals in business continuity and IT operations). This includes hiring (and conducting reference checks), training, staff development, performance management, and annual performance reviews.
  • Manage the budget for the information security function, monitoring and reporting discrepancies.
  • Develop, maintain, and enhance an up-to-date information security management framework for GIA based on the following : International Organization for Standardization (ISO) 27002, ITIL, COBIT / Risk IT or National Institute of Standards and Technology (NIST) Cybersecurity Framework that incorporates :
  • A unified and flexible control framework to integrate and normalize the wide variety and ever-changing requirements resulting from global laws, standards, and regulations.

    A document framework of continuously up-to-date information security policies, standards, and guidelines. Oversee the approval and publication of these information security policies and practices.

    Metrics and reporting framework to measure the efficiency and effectiveness of our information security capabilities, facilitate appropriate resource allocation, and increase information security maturity. Review it with stakeholders at the executive and board levels.

  • Manage enterprise risks according to agreed risk thresholds.
  • Create a risk-based process for assessing and mitigating any information security risk in your ecosystem, which includes employees, vendors, clients, students, consumers, and any other third parties.

    Define and facilitate the processes for information security risk and legal and regulatory assessments, including the reporting and oversight of treatment efforts to address negative findings.

    Oversee technology dependencies outside of direct organizational control. This includes reviewing contracts and the creation of alternatives for managing risk.

  • Monitor the external environment for emerging threats and advise relevant stakeholders on appropriate action.
  • Develop and maintain Information security profiles for GIA’s major systems.
  • Manage and contain information security incidents and events to protect corporate IT assets, intellectual property, regulated data, and the company's reputation.
  • Manage continuous monitoring of GIA’s security for networks, systems, event logging, and applications.
  • Develop and oversee effective disaster recovery policies and standards to align with the enterprise business continuity management (BCM) program goals, with the realization that components supporting primary business processes may be outside the corporate perimeter.
  • Coordinate the development of implementation of incident response plans and procedures to ensure that business-critical services are recovered in the event of a security event; provide direction, support, and in-house consulting in these areas.
  • Facilitate and support the development of asset inventories, including information assets in cloud services and other parties in the organization's ecosystem.
  • Requirements and Qualifications

    GIA Core Values

    Behaves consistently with GIA’s core values : Integrity, Respect, Results, Leadership, Teamwork

    Displays a high level of personal integrity and the ability to professionally handle confidential matters and show an appropriate level of judgment and maturity.

    Relationships / Impact on Others

    Creates an environment that is inclusive and inspires team members to perform to high standards.

  • Demonstrates a Service Mindset. Acts in service to others and GIA’s mission. Puts the institute’s objectives and priorities above personal and / or team. Demonstrates poise and ability to act calmly and competently in high-pressure, high-stress situations to reduce anxiety and stress on others.
  • Displays Effective Communication. Develops and delivers multi-mode communications that convey a clear understanding of the unique needs of different audiences. Demonstrates the ability to communicate information security and risk-related concepts to technical and non-technical audiences at various hierarchical levels, ranging from board members to technical specialists.
  • Builds Collaborative Relationships. Builds connections and nurtures relationships to facilitate the accomplishment of work goals. Demonstrates vulnerability and builds trust. Leads and motivates the information security team and project teams to achieve tactical and strategic goals, even when only "dotted line" reporting lines exist.
  • Optimizes the Talent Experience. Identifies and develops diversity of talent and creates an inclusive environment to improve organizational outcomes. Actively develops team members.
  • Results Orientation

    Consistent track record of achieving results, demonstrating a growth mindset, resilience, and accountability.

  • Demonstrates a growth mindset by showing curiosity and willingness to challenge self and others to learn and evolve, regardless of situation or context. Open to new approaches even if these are inconsistent with previous methodologies.
  • Demonstrates resilience by adopting a “can-do” approach; bounces back when faced with challenges and setbacks by demonstrating a willingness to learn from mistakes or obstacles and move ahead.
  • Demonstrates accountability by owning actions and results; takes responsibility to drive outcomes and achieve successes. Does not make excuses when things do not go well.
  • Business and Industry Acumen

    Thinks and acts as a business leader who applies expertise to address business opportunities and challenges.

  • Demonstrates the ability to think strategically and uses insights to enable decisions for mission and strategy achievement (big-picture alignment). Creates a vision and energizes the appropriate teams in the organization to deliver to that vision.
  • Use organizational savvy to navigate comfortably through complex policy, process, culture, and organizational dynamics to solve problems and accomplish goals
  • Embraces a continuous improvement and innovation mindset and leads the organization in change with tools, processes, and techniques to achieve organizational goals / outcomes
  • Demonstrates effective problem-solving. Incorporates a holistic approach to making quality, timely, ethical decisions that keep the organization moving forward. Must be a critical thinker with an ability to frame problems / opportunities and apply strong analytical skills to identification, assessment, and selection of solution(s).
  • Demonstrates effective and holistic project management skills : financial / budget management, scheduling, resource management, and time management. Balances multiple projects simultaneously
  • Domain / Technical Competencies

  • Bachelor's degree in Engineering, Computer Sciences, Information Technology, or related field; or, 10-12+ years of related experience in progressively challenging Information Security leadership roles comprising a combination of risk management, information security, and IT, with 3+ years of experience leading staff.
  • Sound knowledge of business management and a working knowledge of information security risk management and cybersecurity technologies.
  • Up-to-date knowledge of methodologies and trends in both business and IT.
  • Proven track record and experience in developing information security policies and procedures and successfully executing programs that meet the objectives of excellence in a dynamic business environment.
  • Knowledge and understanding of relevant legal and regulatory requirements, such as relevant local or global laws, standards and regulations, GDPR, State laws, and Payment Card Industry / Data Security Standards.
  • Experience with a wide range of network equipment and security systems in use at the organization (e.g., next-generation firewalls, Cisco IOS, Cisco switches, understanding of IPS (Intrusion Prevention Systems), threat analysis and protection, sandboxing, experience and knowledge of IDS (Intrusion Detection System), IMS (Identity Management System), data exfiltration, and auditing and event logging solutions.
  • Professional security management certifications, such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), or similar credentials, are desirable.
  • Knowledge of common information security management frameworks, such as ISO / IEC 27001, ITIL, and COBIT, as well as those from NIST, including 800-53 and Cybersecurity Framework.
  • Salary range : $190k to $250k

    Disclaimer : This job description indicates in general terms, the type and level of work performed as well as the typical responsibilities of employees in this classification and it may be changed by management at any time. Other duties may also apply. Nothing in this job description changes the at-will employment relationship existing between the Company and its employees.