Information security analyst [h1.location_city]
[job_alerts.create_a_job]
Information security analyst • torrance ca
- [promoted]
Information Security Analyst
TradeJobsWorkForce90002 Los Angeles, CA, US- [promoted]
Acquisition Security Analyst (ASA) II
K2 Group, Inc.El Segundo, CA, US- [promoted]
Information Security & Compliance Manager
WPSTorrance, CA, United StatesInformation Assurance Analyst
SPAEl Segundo, CA, US- [promoted]
Information Systems Security Officer (ISSO)
The Aerospace CorporationEl Segundo, CA, United States- [promoted]
Chief Information Security Officer (Part-time)
PingCAPLong Beach, CA, US- [promoted]
Information Security Analyst
VirtualVocationsLong Beach, California, United States- [promoted]
Information Systems Security Officer (ISSO)
Clearance JobsEl Segundo, CA, US[WEBTOON] IT & Security Analyst
WEBTOON Entertainment Inc. (Wattpad & WEBTOON Family of Brands)El Segundo, CA, USInformation Security Engineer, Principal – Network Protection
Blue Shield of CaliforniaLong Beach, CA, United StatesInternships in Cybersecurity and Information Security
MITREEl Segundo, California, United States of AmericaINFORMATION SECURITY ANALYST II
Marvin GroupInglewood, CA, USInformation Assurance Analyst
Systems Planning and AnalysisEl Segundo, CA, US- [promoted]
Information Security & Compliance Manager
MANSON WESTERN LLCTorrance, CA, US- [promoted]
Associate Industrial Security Analyst
Northrop Grumman (Corporate)El Segundo, CA, USInformation Security Field Engineer - MSP
Hamilton BarnesTorrance, US- [promoted]
Industrial Security Analyst
Northrop GrummanEl Segundo, CA, US- [promoted]
Information Security Engineer
AAreteEl Segundo, CA, United StatesInformation Security Officer - Information Technology Services (Extended)
El Camino CollegeTorrance, CA, USInformation Security Analyst
TradeJobsWorkForce90002 Los Angeles, CA, US- [job_card.full_time]
Monitor their organization’s networks for security breaches and investigate a violation when one occurs
Install and use software, such as firewalls and data encryption programs, to protect sensitive information
Prepare reports that document security breaches and the extent of the damage caused by the breaches
Conduct penetration testing, which is when analysts simulate attacks to look for vulnerabilities in their systems before they can be exploited
Research the latest information technology (IT) security trends
Develop security standards and best practices for their organization
Recommend security enhancements to management or senior IT staff
Help computer users when they need to install or learn about new security products and procedures