Information Security Analyst II

Mach IndustriesHuntington Beach, CA
2d

About The Position

We’re seeking an Information Security Analyst II to drive our efforts to build, maintain, and continuously improve our security and compliance posture across the breadth of our network infrastructure, facilities, and endpoints. You'll continuously collaborate with cross-functional teams, including IT, physical security, product security, GRC, software development, operations, engineering, manufacturing, and legal, to ensure our information security programs exceed both technical and regulatory standards. The ideal candidate has a cybersecurity background with hands-on expertise in network security tools and cloud environments, particularly within regulated and compliance-heavy programs. You are familiar with NIST SP 800-171, CMMC, DFARS, ATO authorization workflows, and/or ISO 27001, and you can translate these requirements into practical, auditable security controls that support mission and compliance objectives.

Requirements

  • 3–5 years of experience in information security, security operations, or a related technical security role.
  • Experience working with security tooling (examples: SIEM like Splunk/Elsastic/Sentinel, EDR like CrowdStrike/MDE, vulnerability tools like Tenable/Qualys).
  • Familiarity with incident response processes and frameworks (NIST, SANS).
  • Strong understanding of common attack techniques and defensive strategies (MITRE ATT&CK).
  • Ability to analyze logs, network traffic, and endpoint activity to investigate suspicious behavior.
  • Strong written and verbal communication skills, with the ability to write clear incident reports and recommendations.

Nice To Haves

  • Security certifications (one or more preferred): Security+, GSEC, SSCP, CySA+, CEH, CISSP (Associate), Splunk certification, Microsoft security certifications, etc.
  • Experience with cloud security (AWS / Azure / GCP), including logging and access control best practices.
  • Familiarity with security automation/SOAR, scripting (Python, PowerShell), or query languages (KQL, SPL).
  • Experience supporting compliance frameworks (SOC 2, ISO 27001, NIST 800-53).
  • Strong understanding of identity and access management, network segmentation, and endpoint hardening.

Responsibilities

  • Monitor, triage, and investigate security alerts from SIEM, EDR/XDR, IDS/IPS, and other detection tools.
  • Respond to security incidents (phishing, malware, unauthorized access, data loss events), perform root cause analysis, and document findings.
  • Create and refine alert logic, detections, and security playbooks to improve response efficiency.
  • Conduct vulnerability scans, validate findings, prioritize remediation, and track closure.
  • Support patch management and secure configuration baselines in partnership with IT and infrastructure teams.
  • Assist in threat modeling, security assessments, and identifying systemic weaknesses.
  • Support security controls testing and evidence gathering for audits (SOC 2, ISO 27001, NIST, ATO, CMMC, as applicable).
  • Maintain and improve security policies, standards, and procedures.
  • Contribute to risk assessments and third-party/vendor risk reviews.
  • Help build security awareness initiatives such as phishing simulation programs and secure behavior training.
  • Provide guidance to internal teams on secure processes and best practices.
  • Participate in security projects such as MFA rollouts, IAM improvements, cloud security hardening, logging standardization, etc.
  • Assist with access reviews, permissions validation, and identity lifecycle processes.
  • Partner with engineering and IT to enhance security architecture and controls.

Benefits

  • health insurance
  • retirement plans
  • opportunities for professional development
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service