Security management Jobs in California

Refine Results
601 - 607 of 607 Jobs

Internship, Red Team Security Engineer, Vehicle Software (Fall 2025)

Tesla Motors

Palo Alto, California, USA

Full-time

This position is expected to start around August or September 2025 and continue through the Fall term (ending approximately December 2025) or continuing into Winter/Spring 2026 if available and there is an opportunity to do so. We ask for a minimum of 12 weeks, full-time and on-site, for most internships. Our internship program is for students who are actively enrolled in an academic program. entry level candidates seeking employment after graduation and not returning to school should apply for

Data Engineering Manager - Data Infra, TikTok Privacy & Security

TikTok

San Jose, California, USA

Full-time

Location : San Jose Employment Type : Regular Job Code : A197606 Apply to this job Share this listing: Responsibilities The team aim to enhance privacy and security worldwide, tackling the unprecedented compliance challenges. We drive privacy initiatives across big data realms, utilizing different approaches. The landscape of privacy and security is measured, analyzed and then enhanced by data. It's becoming a company wide key initiative, with its impact visible in public media. Your cont

IGA Manager

VRK IT Vision Inc.

New Jersey, USA

Full-time

Client - Integral Partners LLC Identity Management IGA REMOTE Full Time/Direct Hire Job Description IGA Manager Full Time Identity Governance & Administration The Identity Governance & Administration (IGA) Manager will be responsible for leading all project resources, and for managing all aspects of delivering complex IGA solutions, including the following: - Identity Data Integration for all user types (Employees, Contingent Workers, Vendors, Partners, and Customers) - Policy-based/Autom

Seeking FIPS, Common Criteria Security Lead

OSI Engineering, Inc.

Remote or Mountain View, California, USA

Contract

A global device company is seeking a highly skilled and experienced individual to lead security and certification initiatives, particularly in achieving FIPS validation of cryptographic modules (FIPS 140-3) and Common Criteria certification for IT products. This is a hands-on role with significant collaboration opportunities within the Mobile Experience Security division and other global security teams. Responsibilities: Lead the end-to-end validation process for IT products, including:Initial

Back End Web Developer

West Advanced Technologies, Inc.

Los Angeles, California, USA

Third Party, Contract

Job Title: Back End Web Developer Location: Los Angeles, CA, 90012 Duration: 12 Months Position Description A Back End Web Developer uses modern, open source software to prototype and deploy back end web applications, including all aspects of server-side processing, data storage, and integration with front end development. The Back End Web Developer will perform web development using open-source web programming languages (e.g., Ruby, Python) and frameworks (e.g., Django, Rails); develop and co

Sr. IT Governance Analyst

Commercial Programming Systems, Inc.

Rosemead, California, USA

Full-time

IT Governance Analyst Hybrid position. Onsite work will be in Rosemead, CA. The position is responsible for supporting key areas within the IT Governance organization. Key functions will focus on IT Risk Assessments, The position will also be involved with the key IT general controls to ensure compliance with FFIEC guidelines, responsible for tracking and reporting on open audit issues and working with the IT organization to ensure timely completion of the issues. Will be the interface to Intern

100% Remote Job Opening for IT Sr. Application Security Analyst || Fulltime

Apetan Consulting

Remote or New Jersey, USA

Full-time

Position: IT Sr. Application Security Analyst Location: Remote Duration: Fulltime Interview: Phone and Skype Job Description: IT Application Security Analysis Responsible for daily researching new threats, attacks, and risks to infrastructure and software. Identify, collect, and organize credible, new intelligence and subject matter relative to current and emerging threats using all the tools, applications and open-source information. Improve security reporting, including coordinating vulne