×
Register Here to Apply for Jobs or Post Jobs. X

Security Analyst

Job in Stockton, San Joaquin County, California, 95202, USA
Listing for: Cubic Corporation
Full Time position
Listed on 2025-12-02
Job specializations:
  • IT/Tech
    Cybersecurity, Security Manager, IT Support
Job Description & How to Apply Below
Security Analyst page is loaded## Security Analyst locations:
Stockton-On-Teestime type:
Full time posted on:
Posted Todayjob requisition :
REQ 46231#
** Business Unit:
** Cubic Transportation Systems# #
** Company Details:**# Cubic Transportation Systems (CTS) is a global leader in intelligent transportation solutions, specializing in technologies that make public transit more efficient, accessible, and user-friendly. A significant feature is providing Fare and Payment card services to government and municipal customers across the globe.
As a member of the Cubic Information Security Team, you will be responsible for supporting efforts to monitor security for Cubic systems and assist in the analysis and response to incidents. The successful candidate must be proficient at security monitoring using Tenable, Crowd Strike, Splunk, and Imperva and other security tools. Work will be on Windows and Linux assets in cloud or data centers.

Analysts will be responsible for IT security tools and processes to manage and report operational security risks to operations teams for remediation. The analyst must have an intimate awareness of PCI security compliance expectations. The candidate will be a partner to support external audits to facilitate PCI-DSS, ISO 27001, and SOC compliance/audit efforts. Scanning operations will involve routine daily or weekly operations as well as support for pen testing or audit efforts.

Findings must be risk rated and effectively escalated for remediation. Will be recognised internally as a subject matter expert. Works autonomously, able to assess and drive work priorities, with limited support or guidance needed.#
** Job Details:
**** Essential

Job Duties and Responsibilities:

**** Security Monitoring Configuration
*** Design and implement security monitoring solutions using SIEM, EDR, NDR, CSPM, and cloud-native tools (e.g. Azure Cloud Defender, AWS Security Hub, Guard Duty, Inspector, and Cloud Watch).
* Integrate log sources from on-prem systems (firewalls, servers, endpoints, network devices) and cloud platforms (IaaS, PaaS, SaaS) into centralized monitoring systems.
* Develop and tune detection rules and correlation logic to identify suspicious behaviour, policy violations, and potential threats.
* Tune detection rules to reduce false positives and improve signal-to-noise ratio.
* Maintain visibility across hybrid environments by ensuring telemetry coverage and log integrity.
** Threat Detection and Analysis
*** Monitor alerts and logs for indicators of compromise (IOCs) and suspicious activity.
* Correlate events across multiple sources to identify potential threats.
* Perform triage and initial investigation of alerts to determine severity, scope, and potential impact.
* Use threat intelligence feeds to enrich alerts and prioritize response.
** Incident Escalation and Coordination
*** Document and escalate validated security incidents to the appropriate operations or incident response teams.
* Provide detailed context, including affected systems, users, and potential impact.
* Collaborate with operations staff to ensure timely containment, eradication, and recovery.
* Track and report on escalated incidents, including root cause analysis and remediation status.
** Continuous Improvement
*** Review and refine detection logic based on incident post-mortems, false positives, emerging threats, and operational feedback.
* Participate in threat hunting and proactive analysis to identify gaps in monitoring coverage.
* Recommend and implement automation for alert triage and response workflows.
* Contribute to playbooks and standard operating procedures for alert handling and escalation.
* Stay current with emerging threats, vulnerabilities, and security technologies.
** Compliance and Reporting
*** Ensure monitoring configurations support regulatory and policy requirements (e.g., PCI, ISO 27001, GDPR, CIS, etc).
* Generate reports on security posture, alert trends, and incident metrics for leadership and governance teams.
* Assist with audits and provide evidence of monitoring controls and incident handling.
** General

Duties and Responsibilities:

*** Reliably demonstrate accountability for work assignments…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary