Information Security Analyst II Job at Mach Industries, Huntington Beach, CA

YTV6cTc5NEZJYldYNjBOMVhCYmtoU0lSeWc9PQ==
  • Mach Industries
  • Huntington Beach, CA

Job Description

About Mach Industries

Founded in 2022, Mach Industries is a rapidly growing defense technology company focused on developing next-generation autonomous defense platforms . At the core of our mission is the commitment to delivering scalable, decentralized defense systems that enhance the strategic capabilities of the United States and its allies. With a workforce of approximately 220 employees , we operate with startup agility and ambition.

Our vision is to redefine the future of warfare through cutting-edge manufacturing, innovation at speed, and unwavering focus on national security. We are dedicated to solving the next generation of warfare with lethal systems that deter kinetic conflict and protect global security.

The Role

We’re seeking an Information Security Analyst II to drive our efforts to build, maintain, and continuously improve our security and compliance posture across the breadth of our network infrastructure, facilities, and endpoints. You'll continuously collaborate with cross-functional teams, including IT, physical security, product security, GRC, software development, operations, engineering, manufacturing, and legal, to ensure our information security programs exceed both technical and regulatory standards.

The ideal candidate has a cybersecurity background with hands-on expertise in network security tools and cloud environments, particularly within regulated and compliance-heavy programs. You are familiar with NIST SP 800-171, CMMC, DFARS, ATO authorization workflows, and/or ISO 27001, and you can translate these requirements into practical, auditable security controls that support mission and compliance objectives.

Key Responsibilities

  • Monitor, triage, and investigate security alerts from SIEM, EDR/XDR, IDS/IPS, and other detection tools.
  • Respond to security incidents (phishing, malware, unauthorized access, data loss events), perform root cause analysis, and document findings.
  • Create and refine alert logic, detections, and security playbooks to improve response efficiency.
  • Conduct vulnerability scans, validate findings, prioritize remediation, and track closure.
  • Support patch management and secure configuration baselines in partnership with IT and infrastructure teams.
  • Assist in threat modeling, security assessments, and identifying systemic weaknesses.
  • Support security controls testing and evidence gathering for audits (SOC 2, ISO 27001, NIST, ATO, CMMC, as applicable).
  • Maintain and improve security policies, standards, and procedures.
  • Contribute to risk assessments and third-party/vendor risk reviews.
  • Help build security awareness initiatives such as phishing simulation programs and secure behavior training.
  • Provide guidance to internal teams on secure processes and best practices.
  • Participate in security projects such as MFA rollouts, IAM improvements, cloud security hardening, logging standardization, etc.
  • Assist with access reviews, permissions validation, and identity lifecycle processes.
  • Partner with engineering and IT to enhance security architecture and controls.

Required Qualifications

  • 3–5 years of experience in information security, security operations, or a related technical security role.
  • Experience working with security tooling (examples: SIEM like Splunk/Elsastic/Sentinel, EDR like CrowdStrike/MDE, vulnerability tools like Tenable/Qualys).
  • Familiarity with incident response processes and frameworks (NIST, SANS).
  • Strong understanding of common attack techniques and defensive strategies (MITRE ATT&CK).
  • Ability to analyze logs, network traffic, and endpoint activity to investigate suspicious behavior.
  • Strong written and verbal communication skills, with the ability to write clear incident reports and recommendations.

Preferred Qualifications

  • Security certifications (one or more preferred): Security+, GSEC, SSCP, CySA+, CEH, CISSP (Associate), Splunk certification, Microsoft security certifications, etc.
  • Experience with cloud security (AWS / Azure / GCP), including logging and access control best practices.
  • Familiarity with security automation/SOAR, scripting (Python, PowerShell), or query languages (KQL, SPL).
  • Experience supporting compliance frameworks (SOC 2, ISO 27001, NIST 800-53).
  • Strong understanding of identity and access management, network segmentation, and endpoint hardening.

Disclosures

This position may require access to information protected under U.S. export control laws and regulations, including the Export Administration Regulations (EAR) and the International Traffic in Arms Regulations (ITAR). Please note that any offer for employment may be conditioned on authorization to receive software or technology controlled under these U.S. export control laws and regulations without sponsorship for an export license.

Mach participates in E-Verify and will provide the federal government with your Form I-9 information to confirm that you are authorized to work in the U.S.

The salary range for this role is an estimate based on a wide range of compensation factors, inclusive of base salary only. Actual salary offers may vary based on (but not limited to) work experience, education and training, critical skills, and business considerations. Highly competitive equity grants are included in most offers and are considered part of Mach’s total compensation package. Mach offers benefits such as health insurance, retirement plans, and opportunities for professional development.

Mach is an equal opportunity employer committed to creating a diverse and inclusive workplace. All qualified applicants will be treated with respect and receive equal consideration for employment without regard to race, color, creed, religion, sex, gender identity, sexual orientation, national origin, disability, uniform service, Veteran status, age, or any other protected characteristic per federal, state, or local law, including those with a criminal history, in a manner consistent with the requirements of applicable state and local laws. If you’d like to defend the American way of life, please reach out!

Job Tags

Work experience placement, Local area,

Similar Jobs

Prosper CFO

CFO Job at Prosper CFO

 ...company and the lives within that company. The Role You will take leadership of a portfolio of growth-minded clients and be their CFO. You will help them define success, create the path there, and coach them along the way. Drawing upon your extensive background in... 

ICAN: Positive Programs for Youth

Chief Advancement Officer Job at ICAN: Positive Programs for Youth

 ...Description The Role Responsibilities The Chief Advancement Officer (CAO) is an executive leader accountable for philanthropic revenue...  ...brand and market presence are in place. The CAO leads with a people-first approach, prioritizing relationships, team well-being... 

Global Contracting Group

Heavy Equipment Lube Tech - Experienced Job at Global Contracting Group

 ...large excavation equipment Perform preventive maintenance such as greasing and/or oil change Requirements: Adhere to Company, MSHA and OSHA safety policies CDL / Tanker Endorsement Clean driving record At times, work out of town Prefer experience... 

ALONJA Enterprises LLC

Customer Support Specialist 1 Job at ALONJA Enterprises LLC

 ...Want to Work from Home and Help People Every Day? Were on the lookout for warm...  ...join our team as Remote Customer Service Representatives ! If you love chatting...  ...What You'll Be Doing: Answering calls from awesome customers and donors... 

CVHCare

Occupational Therapist (OT) - Marin County Job at CVHCare

 ...CVHCare, a leader in Home Health Clinical services , headquartered in beautiful San Ramon CA, is currently seeking Occupational Therapists (OT). This is a great opportunity to join an established leader in the California home health industry, with the freedom to put...