Cyber security analyst jobs in Columbia, SC - 45 jobs
All
Cyber Security Analyst
Securities Analyst
Security Engineer
Information Security Engineer
Senior Security Engineer
Senior Security Analyst
Information Security Analyst
Cyber Security Engineer
Defense Analyst
Information Assurance Analyst
Information Systems Security Officer
Cyber Defense Forensics Analyst
EY 4.7
Cyber security analyst job in Columbia, SC
At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better. Join us and build an exceptional experience for yourself, and a better working world for all.
The exceptional EY experience. It's yours to build.
EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities.
Today's world is fuelled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust.
Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value.
**The opportunity**
Cyber Triage and Forensics (CTF) Incident Analyst will work as a senior member of the technical team responsible for security incident response for EY. The candidate will work as an escalation point for suspect or confirmed security incidents. Responsibilities include performing digital forensic analysis, following security incident response standard methodologies, malware analysis, identify indicators of compromise, support remediation or coordinate remediation efforts of a security incident, and develop documentation to support the security incident response process.
**Your key responsibilities**
+ Investigate, coordinate, bring to resolution, and report on security incidents as they are brought up or identified
+ Forensically analyze end user systems and servers found to have possible indicators of compromise
+ Analysis of artifacts collected during a security incident/forensic analysis
+ Identify security incidents through 'Hunting' operations within a SIEM and other relevant tools
+ Interface and connect with server owners, system custodians, and IT contacts to pursue security incident response activities, including: obtaining access to systems, digital artifact collection, and containment and/or remediation actions
+ Provide consultation and assessment on perceived security threats
+ Maintain, manage, improve and update security incident process and protocol documentation
+ Regularly provide reporting and metrics on case work
+ Resolution of security incidents by identifying root cause and solutions
+ Analyze findings in investigative matters, and develop fact based reports
+ Be on-call to deliver global incident response
**Skills and attributes for success**
+ Resolution of security incidents by identifying root cause and solutions
+ Analyze findings in investigative matters, and develop fact-based reports
+ Proven integrity and judgment within a professional environment
+ Ability to appropriately balance work/personal priorities
**To qualify for the role you must have**
+ Bachelors or Masters Degree in Computer Science, Information Systems, Engineering or a related field
+ 5+ years experience in incident response, computer forensics analysis and/or malware reverse engineering;
+ Understanding of security threats, vulnerabilities, and incident response;
+ Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis;
+ Be familiar with legalities surrounding electronic discovery and analysis;
+ Experience with SIEM technologies (i.e. Splunk);
+ Deep understanding of both Windows and Unix/Linux based operating systems;
**Ideally, you'll also have**
+ Hold or be willing to pursue related professional certifications such as GCFE, GCFA or GCIH
+ Background in security incident response in Cloud-based environments, such as Azure
+ Programming skills in PowerShell, Python and/or C/C++ Understanding of the best security practices for network architecture and server configuration
**What we look for**
+ Demonstrated integrity in a professional environment
+ Ability to work independently
+ Have a global mind-set for working with different cultures and backgrounds
+ Knowledgeable in business industry standard security incident response process, procedures, and life cycle
+ Excellent teaming skills
+ Excellent social, communication, and writing skills
**What we offer you**
The compensation ranges below are provided in order to comply with United States pay transparency laws. Other geographies will follow their local salary guidelines, which may not be a direct conversion of published US salary range/s. At EY, we'll develop you with future-focused skills and equip you with world-class experiences. We'll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn more .
We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $87,700 to $164,000. The salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $105,200 to $186,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year. Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.
**Are you ready to shape your future with confidence? Apply today.**
EY accepts applications for this position on an on-going basis.
For those living in California, please click here for additional information.
EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities.
**EY | Building a better working world**
EY is building a better working world by creating new value for clients, people, society, and the planet, while building trust in capital markets.
Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow.
EY teams work across a full spectrum of services in assurance, consulting, tax, strategy, and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories.
EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law.
EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY's Talent Shared Services Team (TSS) or email the TSS at ************************** .
$105.2k-186.4k yearly 60d+ ago
Looking for a job?
Let Zippia find it for you.
AI Cyber Defense Engineer
Eliassen Group 4.7
Cyber security analyst job in Columbia, SC
**Anywhere** **Type:** Contract **Category:** Engineer **Industry:** Financial Services **Workplace Type:** Remote **Reference ID:** JN -012026-105164 **Shortcut:** ********************************** + Description + Recommended Jobs
**Description:**
_Remote_
Our client is a large U.S. financial institution headquartered in Cincinnati, Ohio, operating over one thousand branches across multiple states. The organization is a Fortune 500 company and one of the largest banks in the United States, with a long history formed by the merger of predecessor banks in the early 20th century.
_Due to client requirements, applicants must be willing and able to work on a w2 basis. For our w2 consultants, we offer a great benefits package that includes Medical, Dental, and Vision benefits, 401k with company matching, and life insurance._
Rate: $80.00 to $90.00/hr. w2
**Responsibilities:**
**Responsibilities**
+ Design, build, and test AI experiments that leverage AWS Bedrock and external lab environments, including model selection, prompting strategies, and orchestration patterns.
+ Develop AI and MCP-related code using secure practices that minimize risks related to model context sharing and tool invocation.
+ Implement and maintain human-in-the-loop processes to ensure responsible oversight of AI and agent workflows.
+ Support data preparation, pipeline construction, and cost monitoring to keep experiments within allocated usage budgets.
+ Apply cybersecurity knowledge to shape experiments that support threat detection, interdiction, and operational security goals.
+ Document experiment configurations, testing outcomes, risks, and recommended next steps.
+ Contribute reusable templates, runbooks, and guardrails to scale AI experimentation safely.
**Experience Requirements:**
**Experience Requirements**
+ 2-5 years of experience in AI/ML engineering, data engineering, or software engineering roles.
+ Hands-on experience with AWS Bedrock, including model provisioning, API integration, prompt configuration, and model evaluation.
+ Proficiency in Python, including interacting with AI/LLM APIs and building small-scale automation or orchestration components.
+ Understanding of secure AI development practices, including safe prompt design and data handling minimization.
+ Experience implementing workflows that include human-in-the-loop validation or approval steps.
+ Exposure to cybersecurity concepts such as detection engineering, incident response, threat intelligence, or security operations.
+ Experience with AWS services such as Lambda, S3, CloudWatch, Step Functions, or DynamoDB.
+ Experience with RAG patterns, vector databases, or embeddings (preferred).
+ Familiarity with model safety evaluations or responsible AI frameworks (preferred).
+ Prior work building prototypes or proof-of-concept AI tools (preferred).
+ Understanding of secure coding principles and adversarial AI risks (preferred).
**_Recruitment Transparency Notice_**
**_Eliassen Group values transparency in our recruitment practices. Please be advised that Eliassen Group utilizes artificial intelligence (AI) tools as part of its initial application screening process. You may receive email and SMS notifications from the Eliassen Virtual Recruiting Team (_** **_noreply@eliassen.com_** **_, ************* inviting you to complete a brief voice screening as part of your application process. These tools assist our hiring teams in different ways, including but not limited to, assistance in reviewing application materials to help identify candidates whose qualifications most closely match the requirements of the position. All AI-assisted evaluations and responses are reviewed by human recruiters before any hiring decisions are made. The use of AI in our process is intended to support fairness, efficiency, and consistency, and Eliassen Group takes measures to prevent bias or discrimination in connection with its hiring practices. By proceeding, you acknowledge, agree, and consent to Eliassen Group's use of these tools, including AI tools, as part of the application and hiring process._**
_Skills, experience, and other compensable factors will be considered when determining pay rate. The pay range provided in this posting reflects a W2 hourly rate; other employment options may be available that may result in pay outside of the provided range._
_W2 employees of Eliassen Group who are regularly scheduled to work 30 or more hours per week are eligible for the following benefits: medical (choice of 3 plans), dental, vision, pre-tax accounts, other voluntary benefits including life and disability insurance, 401(k) with match, and sick time if required by law in the worked-in state/locality._
_Please be advised- If anyone reaches out to you about an open position connected with Eliassen Group, please confirm that they have an Eliassen.com email address and never provide personal or financial information to anyone who is not clearly associated with Eliassen Group. If you have any indication of fraudulent activity, please contact_ _********************_ _._
_About Eliassen Group:_
_Eliassen Group is a leading strategic consulting company for human-powered solutions. For over 30 years, Eliassen has helped thousands of companies reach further and achieve more with their technology solutions, financial, risk & compliance, and advisory solutions, and clinical solutions. With offices from coast to coast and throughout Europe, Eliassen provides a local community presence, balanced with international reach. Eliassen Group strives to positively impact the lives of their employees, clients, consultants, and the communities in which they operate._
_Eliassen Group is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status._
_Don't miss out on our referral program! If we hire a candidate that you refer us to then you can be eligible for a $1,000 referral check!_
$80-90 hourly 3d ago
Information Assurance Analyst
Infojini 3.7
Cyber security analyst job in Columbia, SC
SCOPE OF THE PROJECT: The SCDHHS Office of Information Assurance (OIA) is charged with ensuring the security and compliance of SCDHHS' information systems and data. OIA seeks experienced consultants to assist with the establishment, implementation, and/or enhancement of information system security and compliance efforts based on Federal, State, and Agency regulatory requirements, policies, standards, and guidelines.
Role Summary/Purpose
Overview:
The IA Analyst will report to the Office of Information Assurance and operate as an experienced information assurance consultant to SCDHHS leadership, business units, business partners, vendors, and other stakeholders.
Security Program Experience:
Demonstrated work experience and high degree of familiarity with FISMA or NIST Risk Management Framework-based programs is required. Experience and knowledge of MARS-E is preferred.
This experience should include documented success in the creation and maintenance of Risk Management Framework (RMF) and Assessment and Authorization (A&A) artifacts such as System Security Plans, Privacy Impact Assessments, Interconnection Security Agreements, Computer Matching Agreements, and Plans of Action and Milestones. Such experience will necessarily require excellent communication skills with the ability to interview staff and vendors, to review and analyze existing documentation and diagrams, and to create or collect other required supporting documents as appropriate.
Experience with integrating RMF and A&A tasks into the System Development Life Cycle (SDLC) is preferred.
Experience in security as related to Cloud services and vendor management is desirable for this position.
Technical Knowledge:
Although this is not a technical position, suitable candidates will have a good working knowledge of a broad range of information technologies such as IBM System 390/zSeries, Linux and Windows servers, database management systems, firewalls, IPS solutions, switching and routing infrastructure, data types and data classifications, and related information technologies and concepts.
General Duties and Responsibilities:
1. Assist in the development, implementation, and/or ongoing maturation of SCDHHS security and compliance initiatives.
2. Audit and assess internal agency systems as well as business partner, service provider, and vendor information system security controls.
3. Utilize the Microsoft Office software suite, eGRC system, Bizagi, Atlassian, and other products to document and report on information gathered during audit and assessment activities or other OIA efforts.
4. Participate in third-party audits and/or assessments of agency and business partner systems.
5. Collaborate with agency leadership, business partners, and other parties/stakeholders to provide recommendations for security and compliance risk mitigation efforts.
REQUIRED CERTIFICATION: ISC(2), ISACA, SANS GIAC, or other similar Information Security Certification is required.
EDUCATION PREFERRED: Bachelor's degree in computer science or similar discipline is preferred.
1. Strong working knowledge of FISMA, NIST, and HIPAA Security and Privacy requirements, standards, and guidelines.
2. 5+ years of experience working in the Information Technology field or auditing Information Technology systems or programs.
3. ISC(2), ISACA, SANS GIAC, or other similar Information Security Certification is required.
4. Documented experience in the creation and maintenance of Risk Management Framework (RMF) and Assessment and Authorization (A&A) artifacts such as System Security Plans, Privacy Impact Assessments, Interconnection Security Agreements, Computer Matching Agreements, and Plans of Action and Milestones.
5. Ability to work independently and as a member of a team.
6. Ability to multitask and prioritize tasks effectively in order to meet deadlines.
7. Ability to engage diverse audiences of varying technical and non-technical skill-levels to ensure effective alignment of technical requirements to business objectives.
8. Ability to collaborate and coordinate efforts among multiple teams and vendors.
9. Must have intermediate to advanced skills in Microsoft Office products (Word, Excel, PowerPoint, Visio) to include working with templates and style guidelines for branding consistency.
10. Keen attention to detail while maintaining the ability to see the big picture.
11. Ability to absorb, retain, and communicate complex processes.
12. Strong English language skills.
13. Demonstrable understanding of the rules of English grammar and usage.
14. Ability to accept changes and constructive criticism and to remain flexible in dealing with leadership and teams of varying technical and business knowledge.
Preferred Requirements/Skills:
1. Bachelor's degree in computer science or similar discipline.
2. Strong working knowledge of CMS MARS-E compliance requirements.
3. Prior experience working with an organization subject to CMS MARS-E requirements.
4. Experience and training with eGRC solutions.
5. Prior Health Information Technology experience.
6. Previous Medicaid experience.
7. Understanding of LEAN and Agile development practices.
Additional Information
All your information will be kept confidential according to EEO guidelines.
$53k-70k yearly est. 60d+ ago
Product Security Engineer, AI
Meta 4.8
Cyber security analyst job in Columbia, SC
Meta's Product Security team is seeking a experienced hacker who derives purpose in life by revealing potential weaknesses and then crafting creative solutions to eliminate those weaknesses. Your skills will be the foundation of security initiatives that protect the security and privacy of over two billion people. You will be relied upon to provide engineering and product teams with the web, mobile, or native code security expertise necessary to make informed product decisions. Come help us make life hard for the bad guys.
**Required Skills:**
Product Security Engineer, AI Responsibilities:
1. Security Reviews: perform manual design and implementation reviews of products and services that make up the Meta ecosystem, like Instagram, WhatsApp, Oculus, Portal, and more
2. Developer Guidance: provide guidance and education to developers that help prevent the authoring of vulnerabilities
3. Automated Analysis and Secure Frameworks: build automation (static and dynamic analysis) and frameworks with software engineers that enable Meta to scale consistently across all of our products
**Minimum Qualifications:**
Minimum Qualifications:
4. BS or MS in Computer Science or a related field, or equivalent experience
5. 8+ years of experience finding vulnerabilities in interpreted languages. Knowledge of best practice secure code development
6. Experience with exploiting common security vulnerabilities
7. Knowledge of common exploit mitigations and how they work
8. Coding and scripting experience in one or more general purpose languages
**Preferred Qualifications:**
Preferred Qualifications:
9. Experience creating software that enables security processes, especially those leveraging AI/ML for automation or augmentation
10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling
11. Experience creating software that enables security processes
12. 8+ years of experience finding vulnerabilities in C/C++ code
13. Contributions to the security community (public research, blogging, presentations, bug bounty)
14. Demonstrated ability to collaborate with AI researchers or engineers to apply AI in security workflows
**Public Compensation:**
$184,000/year to $257,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@meta.com.
$184k-257k yearly 60d+ ago
Senior Analyst, Security Compliance (SOX IT)
Coinbase 4.2
Cyber security analyst job in Columbia, SC
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.
Coinbase stores more digital currency than any company in the world, making us a top tier target on the internet. Security is core to our mission and has been a key competitive differentiator for us as we scale worldwide. Essential to scaling is building and running a security compliance program that reflects how we protect the data and assets in our care, to open the doors with customers, regulators, auditors, and other external stakeholders. If you love working with fast moving companies to grow and scale security compliance engines and create positive change across the business, we'd like to speak with you about joining our team. Coinbase is looking for a Security Compliance Senior Analyst to drive the second line of defense IT SOX initiatives and help mature the IT SOX program.
*What you'll be doing (ie. job duties):*
* Lead Security and IT initiatives to support the SOX roadmap and advance program maturity
* Assist with SOX planning activities, including scoping of IT systems and creating training material to owners in preparation for SOX audit
* Lead security control gap assessments over SOX control environment, recommend remediation plans and track through completion
* Assess SOX implications of new products, update relevant controls, and communicate requirements to product organization and other stakeholders
* Provide ongoing reporting to stakeholders and leadership on above responsibilities and communicate progress and escalations management
* Perform SOX audit and control impact analysis as a result of security and technology incidents and partner with owning teams on control uplift activities
* Build close relationships with stakeholder teams including Security, IT, Infrastructure, Engineering, Data, and Finance to advise on SOX requirements and ensure excellence in control ownership
* Create and improve SOX procedural documentation, including process documentation, data flow diagrams, and uplifting templates
* Work closely with internal and external auditors to educate them about a complex technology control environment
* Oversee quality of audit initiatives, identify and analyze process gaps, provide guidance and expertise to team members
* Develop creative solutions to prove risk mitigation and solve for complex audit problems faced by the crypto industry
* Identify opportunities to address systemic program challenges, recommend solutions and drive efficiency through AI and automation
*What we look for in you (ie. job requirements):*
* Minimum of 5+ years of security/IT compliance or equivalent experience
* Strong knowledge and hands-on experience in Internal Controls over Financial Reporting, SOX 404 frameworks, and testing to support compliance
* Prior experience at a big 4 accounting firm
* Experience leading compliance initiatives from start to finish
* Proven understanding and audit experience of cloud technologies, AWS preferred
* Ability to effectively and autonomously accomplish outcomes across cross-functional teams in ambiguous situations with minimal supervision
* Strong oral and written communication skills
* Ability to multitask, direct cross functional work, and hold others accountable to committed deadlines in a fast paced environment
* Ability to communicate with technical / non-technical stakeholders to align on shared outcomes
* Experience in Financial services, Big Tech, or FinTech
*Nice to haves:*
* BA or BS in a technical field or equivalent experience
* Security certifications e.g. CISA, CISSP, CISM or other relevant certifications
* Experience auditing in Crypto space
Position ID: P73675
\#LI-Remote
*Pay Transparency Notice*: Depending on your work location, the target annual *base *salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility + benefits (including medical, dental, vision and 401(k)).
Base salary range shown. Total compensation also includes equity and bonus eligibility and benefits:
$167,280-$196,800 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations***********************************
*Global Data Privacy Notice for Job Candidates and Applicants*
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required.
*AI Disclosure*
For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.
For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.
*The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
$95k-135k yearly est. 60d+ ago
Security Analyst
Mit Resource 4.7
Cyber security analyst job in Columbia, SC
RESPONSIBILITIES : • Assists in the development and implementation of security policies and standards for IT related items procured by the agency (e.g., hardware and software); • Researches and reviews various national and international security standards (e.g., Internal Revenue Service, Federal Information Processing (FIPS), National Institute of Standards and Technology (NIST), and International Organization for Standardization (ISO)) and explains the results, both orally and in writing;
• Attends meetings with the Contract Attorney, General Counsel, Chief Information Officer, Chief Information Security Officer, and Deputy Director in order to determine agency policy as it relates to Information Security.
REQUIRED SKILLS:
- Oral and written communication skills;
- Experience in developing and maintaining documentation for security policies, procedures, and best practices;
- Providing continual consultation and written reports to senior management concerning security issues;
- Hands-on experience documenting and managing all aspects of security within an enterprise organization, including but not limited to:
o Firewall and IDS/IPS experience;
o Virtual Private Networking (VPN);
o Network access policies;
o Web filters;
o Publically accessible assets;
o Active directory;
o Security compliance for third party and/or in-house developed applications;
o Virtualization and Storage area networking security; and
o Anti-Virus management;
- Experience preparing and submitting Security Program evaluations and compliance reports;
- Working with other Department leaders, designing security components for operations and other strategic processes, and supervising the development and implementation of required security reporting devices and processes at all levels.
Extensive working knowledge of Internet protocols, tools, and techniques including but not limited to:
o Virtual Private Networking (VPN);
o TCP/IP, Local Area Networks (LAN), Wide Area Networks (WAN);
o Network device operating systems security configuration;
o Internet security; and
o Internet Information Server;
- Knowledge of Virtual Machine operation, strengths, and weaknesses;
- Experience with VMWare ESX security;
- Support of web-based applications for internal (intranet) sites and external (Internet) sites;
- Experience and working knowledge of backup products and methodologies..
Qualifications
EXPERIENCE:
• At least 10 years experience working as the Chief Information Security Officer, Security Officer, Security Consultant, or SecurityAnalyst for a state or federal agency or large corporation.
• Minimum 6 + Years experience in Application Security and Security - Knowledge in networking, databases, systems and Web operations.
• 6 + Years experience in Security Information Architecture and Windows Security - Group Policy, Network access policies, User access policies.
• 2 - 4 Years experience in Anti-Virus management and VPN - virtual private network.
• And 6 + Years experience in Software Development Lifecycle - SDLC.
• 2 - 4 Years experience in Firewall and Web Filters.
• 6 + Years experience in Experience in developing and maintaining documentation for policies, procedures, and best practices, NIST Security.
Additional Information
Please help pass along to colleagues or associates below position who are looking for new role if you are not available.
Should someone need more information I can be reached at narendra AT
mitresource DOTcom
Thank you for your time.
$61k-85k yearly est. 1d ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Cyber security analyst job in Columbia, SC
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 60d+ ago
Security Analyst
Msysinc
Cyber security analyst job in Columbia, SC
REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE): 6 years information security experience Excellent written skills; Proven work experience in process improvement Ability to identify processes that must be in place for an IT organization to be efficient Extensive knowledge of IRS Pub 1075, NIST 800-53, ITIL, and CJIS
Process Management
ITIL
Business Analysis experience to include data flow diagrams, requirements specifications, use case scenarios, and acceptance testing.
Ability to work with security technicians to develop detailed procedures;
Ability to quickly grasp complex technical concepts and make them easily understandable in both text and diagrams/flow charts
Ability to deliver high quality documentation with attention to detail.
REQUIRED EDUCATION: Bachelor's Degree in a relevant field of work or equivalent work experience.
Additional Information
All your information will be kept confidential according to EEO guidelines.
$55k-76k yearly est. 1d ago
Security Analyst
Ask It Consulting
Cyber security analyst job in Columbia, SC
SecurityAnalyst
Duration : 12+ Months
REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE): Ability to install and use various security tools Application Security Experience in projects involving PCI/NIST security implementations and/or audits
information security principles and practices
IRS Safeguard Computer Security Evaluation Matrix (SCSEM)
IT Security
Malware
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY CONTROLS
risk/vulnerability assessments
Security - Knowledge in networking, databases, systems and Web operations
SSP
Additional Information
All your information will be kept confidential according to EEO guidelines.
$55k-76k yearly est. 60d+ ago
Physical Security System Analyst
Founders Federal Credit Union 4.0
Cyber security analyst job in Lancaster, SC
Relax...Join our Team!
The Physical Security System Analyst will be located at our Corporate Headquarters in Lancaster, SC. Candidate must be available Monday - Thursday 8 am - 5 pm, Friday 8 am - 6 pm.
Responsible for providing support to a variety of physical security measures and controls that safeguard personnel, property, and information. Ensure health and continuity of corporate physical security systems. Work with Information Technology staff and other essential credit union staff to quickly document and remediate identified cyber or physical risks. Assist in implementation of new technologies and processes necessary to enhance security capabilities..
JOB DUTIES:
Provide physical security system support to meet service level agreements.
Analyze physical security system performance and recommend improvements
Assist in resolving complex system issues for physical security systems and networks.
4. Communicate with system manufacturers, vendors, and technical specialists.
5. Assist the Physical Security System Administrator in the setup, programming, and maintenance of Genetec Security Center, and all other physical security applications to ensure optimal performance for our Global Security Operations Center.
6. Assist the Physical Security System Admin in training system users and other system support personnel.
7. Analyze and modify preventive maintenance checklists for system changes.
8. Troubleshoot system performance issues and implement corrective actions.
9. Perform preventive maintenance actions including system back-ups, error log reviews, database size and integrity checks.
10. Organize and prepare detailed documentation of system performance, including service request records and analysis in ServiceNow.
11. Stay current with physical security technology and make recommendations on devices, systems or
analytics/applications that could benefit our security systems.
12. Assist the Physical Security Manager and the Physical Security System Administrator with security related projects as needed.
13. Perform all duties with minimal direct supervision.
14. Comply with Founders' policies and procedures, as well applicable laws, regulations, and statutes issued by
federal agencies such as NCUA and FFIEC, including, but not limited to, GLB and BSA. Employees have
legal and regulatory obligations to respect and protect the privacy of information and its integrity and
confidentiality.
15. All other duties as assigned.
JOB SPECIFICATIONS:
Associate degree or equivalent experience in physical security or information technology.
Genetec Certifications Preferred
Experience with Software House access control and Bosch Intrusion preferred.
Deep understanding of physical security technology related issues.
Strong understanding of security equipment and software as it relates to security access, camera, IP lock, and alarm systems.
Willingness to work occasionally outside of normal business hours.
Excellent English oral and written communication skills.
Must be motivated and possess a strong work ethic.
Possess strong computer skills (i.e.: ability to learn new programs quickly, efficiency with Microsoft Office programs, etc.…)
Outstanding surveillance and observation skills
Integrity and professionalism
Must be willing to travel on short notice to any FFCU location.
Must be able to lift up to 60lbs and work from a ladder when needed.
Experience securing network and computing infrastructure
BENEFITS:
The Physical Security System Analyst will receive an hourly pay plus a competitive benefits package. Benefits provided include the following:
Paid Holidays
Paid Vacation
Family-oriented culture that values work/life balance
Retirement Plan (401k with employer contributions + Pension Plan fully funded by FFCU)
Comprehensive Health and Dental Insurance
Life and Accidental Death & Dismemberment Insurance (at no cost to employee)
Voluntary Supplemental Life Insurance coverage for employee, spouse, and children
Health Care and Dependent Care Flexible spending accounts
Long Term Care Plan
Long-Term Disability Insurance
Tuition reimbursement to assist with furthering education
Certifications - Assistance with achieving and maintaining
Fit Founders Wellness Program
A pre-employment criminal background check, drug screen, consumer credit investigation, and previous employer reference check will be required.
EOE
$65k-90k yearly est. Auto-Apply 14d ago
Senior Security Engineer
Zentek Infosoft 4.2
Cyber security analyst job in Columbia, SC
Zentek is a national recruiting company which partners with many of the leading employers in the Life Sciences, IT, and Financial Services sectors, feel free to check us out at **********************
Job Description
Hi,
Hope you are doing well!!
My name is Ashita, resource professional with Zentek, Inc.
Below are some key highlights of a contract position. If this is of interest please let me know.
I would be happy to arrange a time to discuss the details and/or to further determine which types of opportunities you may be interested in exploring.
Also help me out with your contact details.
Job Title : Senior Security Engineer
Location : South Carolina
Duration : 3 months Contract to hire
Role Description
"The candidate will be responsible for:
• Working directly with a broad range of security tools to implement changes and features
• Developing strategies to improve operational workflow
• Designing systems architectures and deployment strategies
• Provide recommendations to overall system deployment and design
• Providing expertise to members of the team and the customer
• Gather detailed requirements necessary to develop a compliant solution to meet the client needs
• Make recommendations for solutions needed to meet client demands
Preferred Project or Engagement Background
"The candidate will have the following attributes:
• Expert in Linux System Administration
• Expert in a broad range of security tools, Firewalls, NIDS, HIDS, SIEM, Endpoint protection.
• Experience as a consultant, security engineer, similar responsibilities
• Significant experience in security architecture and design techniques
• Knowledge in compliance assessment and solutions for regimes such as PCI, HIPAA, SOX, etc
• Knowledge of data center, cloud based environments, or Security Operations Center (SOC)
• Knowledge of SOC workflow, and use of technology to replace manual labor
• Have relevant industry IT security certifications
• Knowledge and experience in Project Management, including related techniques and tools
• Ability to interpret customer requirements and develop solutions to meet these requirements
• Proven experience in writing statements of work and / or proposals in response to client requirements
• Excellent communication and presentation skills
• Ability to work closely with C Level executives in large enterprises
• Commitment to excellence and willingness to do what is necessary to get the job done
• Ability to travel in support of meetings, presentations, conferences, and similar events
• Able to develop and deliver solutions, and thrive in a fast paced “start up” like environment
Qualifications
Required Skills:
· security architecture and design
· firewall
· HIDS/NIDS
· Linux
· Scripting
· SOC Workflow
· network security
· endpoint protection solutions
Additional Information
All your information will be kept confidential according to EEO guidelines.
$89k-119k yearly est. 60d+ ago
Security Analyst
Novalink Solutions LLC 3.1
Cyber security analyst job in West Columbia, SC
Job DescriptionProviding security and continuous monitoring in a complex network environment across the state of South Carolina. Network includes on-prem and cloud technology supporting 50+ mission critical applications and sites. Daily
administration of modern tools including Tenable products, PAN Cortex XDR, Office 365 Security, and MS Defender.
A small security team means every member gets the opportunity to work in different security functions including
incident detection and response, vulnerability management, identity and access management, and physical security.
Must possess excellent written and verbal communication skills as these are employed often with interdepartmental and
external communications in problem solving.
WHY IS THIS POSITION OPEN?
Rebid - 36-Month tenure reached.
WHAT TYPES OF STAFFING CHALLENGES OR HEADACHES HAVE YOU EXPERIENCED IN THE
PAST? QUALITY OF RESUME?
During the interviews, often we're finding that the candidates don't have the skills or experience that they have outlined
on their resumes, resulting in a waste of time for all parties. We need better vetting from the vendors.
SCOPE OF THE PROJECT:
The Office of the CISO is responsible for securing and monitoring the agency's critical applications and network for the
Department of Social Services. The Department seeks a highly motivated individual who has the skills and experience
needed to support this Office's mission in protecting the Agency's digital environment.
DAILY DUTIES / RESPONSIBILITIES:
Position Description - SecurityAnalyst - Project Lead
• Candidate should be an expert security administration and security continuous monitoring.
• Candidate should be an expert in performing log analysis, risk analysis, incident response processes, and
investigation procedures. This includes experience working in a security operations center and working with
security tools including SIEM, EDR/XDR, IPS/IDS. Candidate should have experience with data blending and
report generation.
Job Duties:
• Planning, implementing, upgrading, and monitoring security measures for the protection of computer network
security and information - both LAN and cloud based.
• Develop and implement security policies, procedures, and standards to protect the organization's data and
assets.
• Monitoring and reporting on SIEM and EDR event data.
• Maintaining records of security events investigated and incident response activities.
• Serve as a Tier III security support on the agency's security team.
• Conduct security assessments of systems, networks, and applications to identify vulnerabilities and risks.
• Work with and provide mentorship to other information security team members on security strategies,
processes, response, and technologies.
• Respond to security incidents and breaches, and work to mitigate the impact and prevent future incidents.
• Provides incident response support, threat assessment, and computer forensic investigations.
• Coordinate and assist with other Information Technology functions/teams to accomplish agency security
objectives.
• Creating risk analysis documents when reviewing system functional specifications including use cases, activity,
sequence, data flow, collaboration, and diagrams.
• Create security report using complex SQL queries, API integrations, and Power BI.
• Knowledge of blue team tools such as SCAP workbench, vulnerability scanning, and hardening techniques.
• Knowledge of red team tools such as nmap, wireshark, Metasploit, and password crackers.
REQUIRED SKILLS:
(Rank in order of importance)
• 4+ years of experience with SIEM, EDR/XDR, and
IPS/IDS
• 4+ years of experience with security documentation
• 4+ years of experience with C/C++, Python, or
Powershell
• 4+ years of experience with Red/Blue Team
• 4+ years of experience with Office 365 Security
Administration
PREFERRED SKILLS:
(rank in order of Importance)
• Preference will be given to experienced Security
Operation Center (SOC) securityanalyst.
• SQL/Scripting (reports and automation)
experience.
REQUIRED EDUCATION/CERTIFICATIONS:
Bachelor's or higher degree in Computer Science or other
quantitative discipline or equivalent work experience.
PREFERRED EDUCATION/CERTIFICATIONS:
Any of the below.
• CISSP
• CCSP
• SSCP
• CEH
RequirementsRequired Skills
Skill Type
Skill Name
CertificationEducationLicenseOtherSkill4+ years of experience with SIEM, EDR/XDR, and IPS/IDS
CertificationEducationLicenseOtherSkill4+ years of experience with security documentation
CertificationEducationLicenseOtherSkill4+ years of experience with C/C++, Python, or Powershell
CertificationEducationLicenseOtherSkill4+ years of experience with Red/Blue Team
CertificationEducationLicenseOtherSkill4+ years of experience with Office 365 Security Administration
Preferred Skills
Skill Type
Skill Name
CertificationEducationLicenseOtherSkillPrevious experience as a Security Operation Center (SOC) securityanalyst.
CertificationEducationLicenseOtherSkillSQL/Scripting (reports and automation) experience
CertificationEducationLicenseOtherSkillCISSP
CertificationEducationLicenseOtherSkillCSSP
CertificationEducationLicenseOtherSkillSSCP
CertificationEducationLicenseOtherSkillCEH
$57k-85k yearly est. 16d ago
Information Systems Security Officer TS/SCI with Poly REQUIRED
CGI Group Inc. 4.5
Cyber security analyst job in Columbia, SC
Seeking an Information Systems Security Officer (ISSO) with a proven track record of DevSecOps success to include a combination of technical skills, communication skills, and cybersecurity skills. is located in Columbia, MD. Your future duties and responsibilities:
. Ensure the implementation and maintenance of security controls in accordance with RMF v5
. Manage ATO packages
. Draft security documentation including Operating Procedures, Cybersecurity Strategy (CSS), System Security Plans (SSP) ATO packages as well as System Security and Privacy Plan (SSPP) in accordance with DoD policies, Department of Airforce (DAF) regulations and our Federal Government customer's guidance.
. The candidate must have expert knowledge and demonstrated experience with cybersecurity technologies, risk management, and incident response procedures as well as have a solid working understanding of computer functions, including hardware, software, and operating systems. This includes knowledge of Windows, Unix, and Linux operating systems, along with other applications such as databases, web servers, networking technologies, including routing, switching, and VPNs.
. The ISSO must be able to work autonomously, manage their workload effectively, shift priorities with little to no loss of productivity and communicate effectively with technical and non-technical personnel.
Required qualifications to be successful in this role:
. Bachelor's degree and 8+ years of experience, or Master's Degree and 6+ years of experience, or PhD and 3+ years of experience. A degree should be within one of the following fields: Information Technology, Computer Science, Cybersecurity, Information Systems, Data Science, or Software Engineering. However, an additional 4 years of relevant experience may be considered in lieu of a Bachelor's degree.
. Well-versed in best practices for cybersecurity program standards, processes, and procedures compliance, industry-standard security frameworks and demonstrated expert working knowledge of NIST Special Publication (SP) 800-53: Recommended Security Controls for Federal Information Systems, NIST SP 800-53A: Guide for Assessing the Security Controls in Federal Information Systems, AFPD 17-1 and AFI 17-130, Cybersecurity
Program Management.
. Ability writing security policies and procedures, CSS, SSP, SSPP, and assess all ATO package artifacts.
. Expert knowledge of Risk Management Framework (RMF) v5 (Processes, workflow, etc.).
. Ability to use eMASS to execute, RMF v5 to include document / update system status, identify, document, and manage implementation of operational and technical security controls, implementation and risk assessment tabs, non-compliant and non-validated controls, POAM management (entry, evidence, close-out), produce report and track Plan of Action and Milestone (POA&M) due dates, etc.
. The ability to complete a checklist to ensure Security Authorization Process documents are complete and comply with all guidance.
. Ability to work collaboratively with IT counterparts, communicate effectively (skilled in communicating complex technical information to non-technical audience) and coordinate STIG remediation with system administrators and developers.
. Ability to conduct risk assessments, monitor security Incidents and respond appropriately to Security Threats.
. Working understanding of network technology (includes knowledge of network protocols
Desired qualifications/non-essential skills required:
. Experience transitioning from RMF v4 to v5.
. Experience with cloud computing platforms such as AWS and Azure.
. Basic understanding of identity and access management system capabilities and configuration.
. Experience with TASKORDS, OPORDS, etc.
. Experience leading Cybersecurity (ISSO & ISSE) teams.
CGI is required by law in some jurisdictions to include a reasonable estimate of the compensation range for this role. The determination of this range includes various factors not limited to skill set, level, experience, relevant training, and licensure and certifications. To support the ability to reward for merit-based performance, CGI typically does not hire individuals at or near the top of the range for their role. Compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range for this role in the U.S. is $79,600.00 - $194,000.00.
CGI Federal's benefits are offered to eligible professionals on their first day of employment to include:
. Competitive compensation
. Comprehensive insurance options
. Matching contributions through the 401(k) plan and the share purchase plan
. Paid time off for vacation, holidays, and sick time
. Paid parental leave
. Learning opportunities and tuition assistance
. Wellness and Well-being programs
#CGIFederalJob
#LI-LB1
#ClearanceJobs
Skills:
* CompTIA Security+
* Network
* TCP/IP
What you can expect from us:
Together, as owners, let's turn meaningful insights into action.
Life at CGI is rooted in ownership, teamwork, respect and belonging. Here, you'll reach your full potential because…
You are invited to be an owner from day 1 as we work together to bring our Dream to life. That's why we call ourselves CGI Partners rather than employees. We benefit from our collective success and actively shape our company's strategy and direction.
Your work creates value. You'll develop innovative solutions and build relationships with teammates and clients while accessing global capabilities to scale your ideas, embrace new opportunities, and benefit from expansive industry and technology expertise.
You'll shape your career by joining a company built to grow and last. You'll be supported by leaders who care about your health and well-being and provide you with opportunities to deepen your skills and broaden your horizons.
Come join our team-one of the largest IT and business consulting services firms in the world.
Qualified applicants will receive consideration for employment without regard to their race, ethnicity, ancestry, color, sex, religion, creed, age, national origin, citizenship status, disability, pregnancy, medical condition, military and veteran status, marital status, sexual orientation or perceived sexual orientation, gender, gender identity, and gender expression, familial status or responsibilities, reproductive health decisions, political affiliation, genetic information, height, weight, or any other legally protected status or characteristics to the extent required by applicable federal, state, and/or local laws where we do business.
CGI provides reasonable accommodations to qualified individuals with disabilities. If you need an accommodation to apply for a job in the U.S., please email the CGI U.S. Employment Compliance mailbox at US_Employment_******************. You will need to reference the Position ID of the position in which you are interested. Your message will be routed to the appropriate recruiter who will assist you. Please note, this email address is only to be used for those individuals who need an accommodation to apply for a job. Emails for any other reason or those that do not include a Position ID will not be returned.
We make it easy to translate military experience and skills! Click here to be directed to our site that is dedicated to veterans and transitioning service members.
All CGI offers of employment in the U.S. are contingent upon the ability to successfully complete a background investigation. Background investigation components can vary dependent upon specific assignment and/or level of US government security clearance held. Dependent upon role and/or federal government security clearance requirements, and in accordance with applicable laws, some background investigations may include a credit check. CGI will consider for employment qualified applicants with arrests and conviction records in accordance with all local regulations and ordinances.
CGI will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with CGI's legal duty to furnish information.
$56k-78k yearly est. 46d ago
Cloud Security Engineer
Ford Motor Company 4.7
Cyber security analyst job in Columbia, SC
We are the movers of the world and the makers of the future. We get up every day, roll up our sleeves and build a better world -- together. At Ford, we're all a part of something bigger than ourselves. Are you ready to change the way the world moves?
The Enterprise CyberSecurity Cloud Security team is responsible for working with other security and cloud services teams to ensure alignment and collaboration in securing Ford's public cloud infrastructure. The teams work closely together to identify security gaps in the cloud environments and address them.
The Cloud Security team is responsible for identifying, evaluating, and recommending cloud security tools and functions to enhance security around Ford's public cloud. The team is also responsible for developing and managing the following Security Services in Ford's public cloud environments:
- Cloud Security Automation Development
- GCP/Azure Security Compliance
- GCP VPC Service Control
- GCP Cloud Armor/ Azure WAF
**What you'll do...**
+ Partner with other Cloud Security team members to identify and develop automation for security related workflows and audits (VPC SC, DLP, Exceptions, Org Policy, etc..).
+ Lead evaluation and develop an understanding of tools needed to address security gaps.
+ Lead/Collaborate with EPEO Services teams on security gap remediation.
**You'll have...**
+ Bachelor's degree in Computer Science, Information Technology or related OR a combination of education and experience
+ 5+ years of scripting and automation experience
+ Proven experience in developing and implementing automation using scripting languages such as
+ Python, PowerShell, or Go, particularly for API integrations, security tool orchestration, and custom audit scripts.
+ Solid understanding and practical experience with Git and GitHub for version control, collaborative development, and security automation pipeline management.
+ Familiarity with CI/CD pipelines and automated deployment tools (e.g., Jenkins, Azure DevOps, GitHub Actions) to integrate security automation into the software development lifecycle.
+ Knowledge of Infrastructure-as-Code (IaC) principles and tools like Terraform.
+ Strong knowledge of security best practices and guidelines (at the enterprise-level) related to GCP and Azure Cloud deployments as well as common web application frameworks
+ Understand the functionality and secure usage of various GCP services: VPCs, IAM, security groups, compute engine, cloud storage, Security Command Center, VPC Service Control, Cloud DLP and Cloud Armor
+ Customer focused and strong team orientation
+ Self-starter and fast-learner
+ Strong communication and interpersonal skills
+ Strong problem solving and Analytical/Reasoning skills
+ Strong drive for results and ability to work independently
+ Demonstrated commitment to quality and project timing
+ Familiarity with the agile project planning process and use of Rally.
+ Document processes & procedures and developing other documentation.
**Even better, you may have...**
+ Understand the functionality and secure usage of various Azure services: Virtual Machines, Virtual Networks, Azure Active Directory, App Services, Azure SQL Databases, Storage Accounts, Kubernetes, Containers, Key vaults.
You may not check every box, or your experience may look a little different from what we've outlined, but if you think you can bring value to Ford Motor Company, we encourage you to apply!
As an established global company, we offer the benefit of choice. You can choose what your Ford future will look like: will your story span the globe, or keep you close to home? Will your career be a deep dive into what you love, or a series of new teams and new skills? Will you be a leader, a changemaker, a technical expert, a culture builder...or all of the above? No matter what you choose, we offer a work life that works for you, including:
- Immediate medical, dental, vision and prescription drug coverage
- Flexible family care days, paid parental leave, new parent ramp-up programs, subsidized back-up child care and more
- Family building benefits including adoption and surrogacy expense reimbursement, fertility treatments, and more
- Vehicle discount program for employees and family members and management leases
- Tuition assistance
- Established and active employee resource groups
- Paid time off for individual and team community service
- A generous schedule of paid holidays, including the week between Christmas and New Year's Day
- Paid time off and the option to purchase additional vacation time.
For a detailed look at our benefits, click here:
*******************************
This position is a range of salary grades 7-8.
Visa sponsorship is not available for this position.
SOUTHEAST MI RESIDENTS: This role is posted as remote unless you reside within 50 miles of Dearborn, MI-in which case we request on-site presence up to 4 days a week.
Candidates for positions with Ford Motor Company must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire.
We are an Equal Opportunity Employer committed to a culturally diverse workforce. All qualified applicants will receive consideration for employment without regard to race, religion, color, age, sex, national origin, sexual orientation, gender identity, disability status or protected veteran status. In the United States, if you need a reasonable accommodation for the online application process due to a disability, please call **************.
\#LI-Remote
**Requisition ID** : 54783
$65k-93k yearly est. 17d ago
Security Engineer II
Trustmark 4.6
Cyber security analyst job in Columbia, SC
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled CyberSecurity Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cybersecurity designs.
**Responsibilities:**
+ Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
$74k-95k yearly est. 60d+ ago
Security Engineer - IR Threat Intelligence
Meta 4.8
Cyber security analyst job in Columbia, SC
Meta Security is looking for a threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture.
**Required Skills:**
Security Engineer - IR Threat Intelligence Responsibilities:
1. Track threat clusters posing threats to Meta's infrastructure and employees, and identify, develop and implement countermeasures on our corporate network
2. Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences
3. Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations
4. Improve the tooling of threat cluster tracking and intelligence data integration to existing systems
5. Engage constructively in cross-functional projects to improve the security posture of Meta's infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions
**Minimum Qualifications:**
Minimum Qualifications:
6. 5+ years threat intelligence experience
7. Bachelor's degree or equivalent experience in Security
8. Familiarity with campaign tracking techniques and ability to convert the tracking results to long term countermeasures
9. Familiarity with threat modeling framework, such as Diamond Model or/and MITRE ATT&CK framework
10. Experience intelligence-driven hunting to spot suspicious activities in the network and identify potential risks
11. Proven track record of managing and executing on short term and long term projects
12. Ability to work with a team spanning multiple locations/time zones
13. Ability to prioritize and execute tasks with minimal direction or oversight
14. Ability to think critically and qualify assessments with solid communications skills
15. Coding or scripting experience in one or more scripting languages such as Python or PHP
**Preferred Qualifications:**
Preferred Qualifications:
16. Experience close collaborating with incident responders on incident investigations
17. Familiarity with malware analysis or network traffic analysis
18. Familiarity with nation-state, sophisticated criminal, or supply chain threats
19. Production of file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort
20. Experience in one or more query languages such as SQL
21. Experience writing production code for threat intelligence tooling
22. Experience conducting large scale data analysis
23. Experience working across the broader security community
**Public Compensation:**
$154,000/year to $217,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@meta.com.
$154k-217k yearly 16d ago
Security Analyst
MIT Resource 4.7
Cyber security analyst job in Columbia, SC
RESPONSIBILITIES :
• Assists in the development and implementation of security policies and standards for IT related items procured by the agency (e.g., hardware and software);
• Researches and reviews various national and international security standards (e.g., Internal Revenue Service, Federal Information Processing (FIPS), National Institute of Standards and Technology (NIST), and International Organization for Standardization (ISO)) and explains the results, both orally and in writing;
• Attends meetings with the Contract Attorney, General Counsel, Chief Information Officer, Chief Information Security Officer, and Deputy Director in order to determine agency policy as it relates to Information Security.
REQUIRED SKILLS:
- Oral and written communication skills;
- Experience in developing and maintaining documentation for security policies, procedures, and best practices;
- Providing continual consultation and written reports to senior management concerning security issues;
- Hands-on experience documenting and managing all aspects of security within an enterprise organization, including but not limited to:
o Firewall and IDS/IPS experience;
o Virtual Private Networking (VPN);
o Network access policies;
o Web filters;
o Publically accessible assets;
o Active directory;
o Security compliance for third party and/or in-house developed applications;
o Virtualization and Storage area networking security; and
o Anti-Virus management;
- Experience preparing and submitting Security Program evaluations and compliance reports;
- Working with other Department leaders, designing security components for operations and other strategic processes, and supervising the development and implementation of required security reporting devices and processes at all levels.
Extensive working knowledge of Internet protocols, tools, and techniques including but not limited to:
o Virtual Private Networking (VPN);
o TCP/IP, Local Area Networks (LAN), Wide Area Networks (WAN);
o Network device operating systems security configuration;
o Internet security; and
o Internet Information Server;
- Knowledge of Virtual Machine operation, strengths, and weaknesses;
- Experience with VMWare ESX security;
- Support of web-based applications for internal (intranet) sites and external (Internet) sites;
- Experience and working knowledge of backup products and methodologies..
Qualifications
EXPERIENCE:
• At least 10 years experience working as the Chief Information Security Officer, Security Officer, Security Consultant, or SecurityAnalyst for a state or federal agency or large corporation.
• Minimum 6 + Years experience in Application Security and Security - Knowledge in networking, databases, systems and Web operations.
• 6 + Years experience in Security Information Architecture and Windows Security - Group Policy, Network access policies, User access policies.
• 2 - 4 Years experience in Anti-Virus management and VPN - virtual private network.
• And 6 + Years experience in Software Development Lifecycle - SDLC.
• 2 - 4 Years experience in Firewall and Web Filters.
• 6 + Years experience in Experience in developing and maintaining documentation for policies, procedures, and best practices, NIST Security.
Additional Information
Please help pass along to colleagues or associates below position who are looking for new role if you are not available.
Should someone need more information I can be reached at narendra ATmitresourceDOTcom
Thank you for your time.
$61k-85k yearly est. 60d+ ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Cyber security analyst job in Columbia, SC
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 60d+ ago
Security Anlyst
Ask It Consulting
Cyber security analyst job in Columbia, SC
ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations. We have openings for SecurityAnalyst for one of our client in ColumbiaSC
Job Description
Looking for a CA, familiar with setting up and maintaining a C&A framework ..from scratch.
10+ years of experience of Information Assurance (IA) experience that includes obtaining and managing NIST-800 or DIACAP security certification and accreditation (C&A) of systems, networks, and sites.
• Broad knowledge of NIST and Federal Information Security Management Act (FISMA) and the associated reporting requirements
• Develop pre-briefs and post-briefs for senior level officials.
• Reviewing and maintaining of certification plans and accreditations documentation, performing security, analyses and risk/vulnerability assessments, conducting security tests and evaluations, and the coordination of certification and accreditation activity for project teams
• Strong Information assurance skills
• Working in a constantly changing threat environment
• Managing and leading efforts in the review, application and maintenance of information assurance policies and procedures
• Must have experience working with FSO and DAA and writing Plan of action and Milestones (POA&M) and the importance of tracking these to completion.
Additional Information
Ask IT Consulting Inc.| 33 Peachtree St., Suite 100 |Holtsville, NY 11742
Website: **********************
$55k-76k yearly est. 60d+ ago
Offensive Security Engineer, Assessments (Web3)
Coinbase 4.2
Cyber security analyst job in Columbia, SC
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.
The Application Security organization at Coinbase is seeking to hire an experienced Offensive Security Engineer specializing in Web3 penetration testing and Web3 bug bounty program management and optimization. In this role, you will collaborate with the Bug Bounty Program Lead to drive Web3 bug bounty triage, validation, and strategic initiatives aimed at increasing program efficiency, maturity, and hacker engagement. You will work closely with whitehat hackers, security engineers, and cross-functional teams to enhance Coinbase's security posture through an effective bug bounty program. Additionally, you will perform penetration tests on Web3 technologies and applications, ensuring the security of Coinbase's blockchain-based products and services.
*What you'll be doing (ie. job duties):*
* Conduct security assessments of Web3 products and services, including smart contracts, DeFi protocols, and blockchain infrastructure.
* Collaborate with partner teams to enhance detection and response capabilities for Web3 vulnerabilities.
* Stay informed on emerging security trends, advisories, and academic research in the Web3 space.
* Lead Web3 bug bounty triage and validation, ensuring timely and accurate assessments of reported vulnerabilities.
* Develop and implement strategies to incentivize high-quality bug bounty submissions and engage with the hacker community.
* Manage the Web3 bug bounty program, including scope updates, researcher communication, and payout disbursements.
* Analyze bug bounty data to identify trends, common vulnerabilities, and areas for improvement.
* Collaborate with engineering teams to prioritize and remediate vulnerabilities identified through the bug bounty program.
* Mentor and train junior security engineers in Web3 bug bounty triage and analysis.
* Provide on-call support for critical Web3 bug bounty-related incidents.
* Document and report on Web3 bug bounty metrics and program effectiveness.
*What we look for in you (ie. job requirements):*
* Bachelor's or Master's degree in Computer Science, Cybersecurity, Software Engineering, or a related field.
* 3+ years of experience in Web3 application security and penetration testing.
* Proven track record of identifying critical vulnerabilities across the blockchain protocol stack, Web2, and Web3 components.
* Extensive knowledge of the blockchain ecosystem, including L1/L2 networks, DeFi protocols, and staking mechanisms.
* Deep understanding of Web2 security concepts and common vulnerabilities (e.g., OWASP Top 10, SANS Top 25).
* Strong analytical skills to identify trends and patterns in vulnerabilities.
* Excellent communication skills for engaging with internal teams.
* Passion for security and a drive to improve Web3 security posture.
* Ability to work independently and take ownership of penetration testing initiatives.
* Energy and self-drive for continuous learning in the rapidly evolving crypto space.
* Excellence in clear, direct, and kind communication with technical and non-technical stakeholders.
* Experience building relationships with product, engineering, and security teams.
*Nice to haves:*
* Participation in CTFs, bug bounty programs, or open-source security research.
* Expertise in Application Security, Network Security, or Cloud Security.
* Relevant security certifications (e.g., OSCP, GPEN).
* Experience developing and implementing security tooling to support bug bounty triage and analysis.
* Experience with bug bounty programs and platforms, including triage, validation, and researcher communication.
* Strong analytical skills to identify trends and patterns in bug bounty submissions.
* Excellent communication skills to effectively engage with bug bounty researchers.
Position ID: P69494
\#LI-remote
*Pay Transparency Notice*: Depending on your work location, the target annual *base *salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility + benefits (including medical, dental, vision and 401(k)).
Base salary range shown. Total compensation also includes equity and bonus eligibility and benefits:
$152,405-$179,300 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations***********************************
*Global Data Privacy Notice for Job Candidates and Applicants*
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required.
*AI Disclosure*
For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.
For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.
*The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
How much does a cyber security analyst earn in Columbia, SC?
The average cyber security analyst in Columbia, SC earns between $56,000 and $100,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in Columbia, SC