Security analyst serp_jobs.h1.location_city
serp_jobs.job_alerts.create_a_job
Security analyst • torrance ca
- serp_jobs.job_card.promoted
Information Security Analyst
TradeJobsWorkForce90002 Los Angeles, CA, US- serp_jobs.job_card.promoted
Security Analyst Intern Summer 2026
Rocket LabLong Beach, CA, United States- serp_jobs.job_card.promoted
Security Officer
Terminal Security Solutions Inc.Carson, CA, USSecurity Coordinator
MattelEl Segundo, California, USAGame Security Analyst
Nexon America IncEl Segundo, CA, US- serp_jobs.job_card.promoted
Security Engineer (Security Operations)
Jobs via DiceHawthorne, CA, United States- serp_jobs.job_card.promoted
Security Officer
Government JobsCompton, CA, US- serp_jobs.job_card.promoted
Security Guard
Terminal Security SolutionsLong Beach, CA, USAcquisition Security Analyst
SAICEl Segundo, California, United StatesMid-Level Industrial Security Analyst
BoeingEl Segundo, California, USAINFORMATION SECURITY ANALYST I
Marvin GroupInglewood, CA, US- serp_jobs.job_card.promoted
Game Security Analyst
Nexon AmericaEl Segundo, CA, United States- serp_jobs.job_card.promoted
Industrial Security Analyst
Clearance JobsManhattan Beach, CA, USSr. Industrial Security Analyst (MDSO)
SpaceXHawthorne, CASecurity Analyst
VirtualVocationsCarson, California, United States- serp_jobs.job_card.promoted
Security Officer
TradeJobsWorkforce90003 Los Angeles, CA, US- serp_jobs.job_card.promoted
Industrial Security Analyst
Northrop GrummanRedondo Beach, CA, USSecurity Engineer (Security Operations)
SpacexHawthorne, California, United States- serp_jobs.job_card.promoted
Security Architect
UNICON InternationalTorrance, CA, United StatesInformation Security Analyst
TradeJobsWorkForce90002 Los Angeles, CA, US- serp_jobs.job_card.full_time
Monitor their organization’s networks for security breaches and investigate a violation when one occurs
Install and use software, such as firewalls and data encryption programs, to protect sensitive information
Prepare reports that document security breaches and the extent of the damage caused by the breaches
Conduct penetration testing, which is when analysts simulate attacks to look for vulnerabilities in their systems before they can be exploited
Research the latest information technology (IT) security trends
Develop security standards and best practices for their organization
Recommend security enhancements to management or senior IT staff
Help computer users when they need to install or learn about new security products and procedures