Cyber Security Analyst
Cyber security analyst job in North Charleston, SC
PRIMARY DUTIES & RESPONSIBILITIES:
Conducts regular risk assessments to identify potential vulnerabilities and threats within the AWS IL5 environment
Develops strategies for risk mitigation and implements necessary controls to address identified risks
Maintains a risk register documenting identified risks and corresponding mitigation actions
Ensures AWS configurations align with IL5 security requirements, including encryption, access controls, and network segmentation
Implements and enforces compliance with relevant security standards and regulations, such as NIST SP 800-53 and DoD IL5 requirements
Monitors AWS configurations for deviations from security baselines and promptly remediates any non-compliant settings
Implements strong IAM policies to enforce least privilege access across AWS resources
Regularly reviews IAM roles and permissions to ensure alignment with the principle of least privilege
Enables multi-factor authentication (MFA) for privileged accounts and sensitive operations
Deploys robust monitoring tools to detect unauthorized access attempts, suspicious activities, and security breaches
Establishes incident response procedures to promptly respond to security incidents and minimize their impact
Conducts post-incident reviews to identify lessons learned and improves incident response processes
Implements encryption mechanisms to protect data at rest and in transit within the AWS IL5 environment
Regularly reviews encryption policies and key management practices to ensure effectiveness
Provides regular security training and awareness programs to AWS IL5 users and administrators
Educates users about common cyber threats, phishing attacks, and best practices for secure usage of AWS resources
Encourages a culture of security awareness and proactive risk mitigation among all stakeholders
Conducts periodic security assessments and audits to evaluate the effectiveness of cyber security controls
Identifies areas for improvement and implement enhancements to strengthen the security posture of the AWS IL5 Cloud SCCA
Stays abreast of emerging cyber threats, vulnerabilities, and industry best practices to adapt security measures accordingly
Travels approximately 3-4 days a quarter, as required
DESIRED SKILLS & REQUIREMENTS:
RMF experience
USMC Cyber experience
SAFe (Scaled Agile Framework) experience
Working Place: North Charleston, South Carolina, United States Company : Scientific Research Corporation
Cyber Security Analyst, Intermediate
Cyber security analyst job in Aiken, SC
Savannah River National Laboratory (SRNL) is seeking a Cyber Security Analyst to join the Cyber Engineering team! The selected individual will work with other team members to ensure robust security controls are selected, implemented, and maintained for a NIST RMF accredited boundaries within unclassified environments.
Minimum Qualifications:
Bachelor's degree in relevant field of study and 4-6 years of work experience
At least 1 general cybersecurity certification and 1 technical certification
Technical skills include: understanding security architectures, encryption, firewalls, IDS/IPS, Network security protocols, and applying STIGs.
Experience and proficient with cyber tools for vulnerability assessments, SEIM, Endpoint protection and security frameworks.
Strong understanding of risk management and experience with familiarity with cloud security principles
Soft skills include excellent communication and interpersonal skills, strong attention to detail, ability to multi-task and to collaborate in a team environment
For ability to obtain and maintain a security clearance, US Citizenship is Legally Required
Preferred Qualifications:
Understanding of NIST Risk Management Framework and Control Sets (i.e., NIST 800-37 and NIST 800-53)
Current of former experience with DOE cybersecurity or a federal-contractor cybersecurity technical position
Experience with zero-trust architecture
Ability to learn new technologies, concepts, and processes quickly
Splunk or Tenable Certifications
Active DOE clearance
Team in designing, implementing, and maintaining secure environments applying the NIST RMF framework.
Develop strategies for complex security strategies unique to their operating environment.
Implement enforceable technical security controls for protection of networks and systems using authorized sources such as STIGs and SRGs
Support the ISSO with the technical aspects of the development and ongoing maintenance of security controls and authorization activities
Perform and review technical assessments and security reports
Work effectively in a team environment to resolve issues and contribute to continuous process improvement efforts
Interact with customers and peers in a professional and responsive manner to ensure secure practices.
Provide expert support and communicate effectively on security matters
Auto-ApplyInformation Security Analyst
Cyber security analyst job in Conway, SC
Posting Details Classification Title IT Security Specialist/ Analyst I Classification Code AM80 Pay Band 6 Subject to Drug/Alcohol Testing Guidelines No Subject to Credit Check No Internal Title Information Security Analyst Department Information Technology Services Position Type PCLS - Slotted Classified Full or Part Time Full-Time Basis 12 mo. Hours per week 37.5 hours per week Normal Work Schedule Mon-Thu: 8-5 ; Fri: 8-12:30 Job Details
Coastal Carolina University is currently accepting applications for the following full-time position: Information Security Analyst in the Office of Information Technology Services.
Coastal Carolina University's Information Technology Services is looking for an information security analyst who is responsible for monitoring, analyzing, and mitigating cybersecurity and compliance risks. The analyst will also aid in the development of solutions, research new technologies, assist in policy changes, and recommend content for security awareness programs.
How to Apply: Interested candidates may apply online at ***************************************** Applicants must submit a cover letter, resume and list of three (3) professional references. Review of applications will begin immediately and continue until position is filled.
Required Qualifications: A bachelor's degree in information technology systems, computer science, or related field and experience in information technology systems or related area. Relevant experience may be substituted for bachelor's degree on a year-for-year basis.
Preferred Qualifications: Experience with incident response, security monitoring, data loss prevention, implementing security controls, administering vendor supplied security software, risk assessment, security and privacy compliance, and/or participating on disaster recovery planning team.
Duties include, but are not limited to:
* Research information security events, incidents, and issues to isolate and identify root or systemic causes. Responds according to policy and best practices.
* Assists business units and operational teams with information security risk assessments and audits.
* Gathers, compiles, and synthesizes information for security processes and systems around vulnerabilities and risk.
* Aids in the development of solutions through security partnerships and research on new technologies, required policy changes, and vendor offerings.
* Recommends content for information security training and awareness programs.
IT Security Specialist/Analyst I (AM80/61122728/FTE-S01096P), full-time position with benefits. SC State Pay Band: 06. Salary range: $47,588.00 (minimum) - $67,817.00 (midpoint). Normal work hours are Monday through Thursday, 8:00 a.m. to 5:00 p.m. and Friday, 8:00 a.m. to 12:30 p.m. Must be flexible to meet the special scheduling needs of the university.
Coastal Carolina University is a public comprehensive liberal arts institution located in Conway, South Carolina, just nine miles from the Atlantic coastal resort city of Myrtle Beach. Coastal
Carolina University enrolls over 10,000 students from 49 states and 55 nations. The University is accredited by the Southern Association of Colleges and Schools Commission on Colleges to award the baccalaureate and master's degrees of national and/or regional significance in the arts and sciences, business, humanities, education, and health and human services, a specialist degree in instructional technology, and PhD degrees in marine science: coastal and marine systems science and education sciences.
The University provides equal employment opportunity without regard to race, color, religion, sex, sexual orientation, gender identity, citizenship status, national origin, or because an employee or applicant for employment is an individual with a disability or a disabled veteran, an Armed Forces service medal veteran, a recently separated veteran, or an active-duty wartime or campaign badge veteran, or other "protected veteran," as defined by law. Coastal Carolina University is an EO/AA employer.
Required Qualifications
A bachelor's degree in information technology systems, computer science, or related field and experience in information technology systems or related area. Relevant experience may be substituted for bachelor's degree on a year-for-year basis.
Preferred Qualifications
Experience with incident response, security monitoring, data loss prevention, implementing security controls, administering vendor supplied security software, risk assessment, security and privacy compliance, and/or participating on disaster recovery planning team.
Knowledge, Skills & Abilities
Possess knowledge of system and network security for various operating systems and local area networks. Experience with security tools and technologies for deploying, managing, measuring, and auditing system and network security. Has a foundational understanding of application, hosted service, and cloud security principles. Capable of contributing to the creation of detailed technical documentation on security processes and procedures. Demonstrates basic analytical and problem-solving skills. Understands risk concepts and principles. Communicates effectively with audiences of varying technical knowledge levels.
Posting Detail Information
Posting Number FTE-S01096P Number of Vacancies 1 Desired Start Date 01/12/2026 Position End Date (if temporary) Job Open Date 12/11/2025 Job Close Date Open Until Filled Yes Special Instructions to Applicants Quicklink for Posting ****************************************
Job Duties
Senior Cyber Security Analyst - (ISSM)
Cyber security analyst job in Aiken, SC
DNI is on the lookout for a Senior Cyber Security Analyst - Information Systems Security Manager (ISSM) to deliver expert guidance in Information Systems Security and cybersecurity support for the Enterprise Information Services at the Department of Energy (DOE) Savannah River Operations Office (DOE-SR), located at the Savannah River Site (SRS) in Aiken, SC.
Requirements
Reports to the Chief Information Security Officer (CISO) and Program Manager.
Oversee the Authority to Operate (ATO) lifecycle, manage risk assessments, develop and monitor Plan of Action and Milestones (POAMs), ensuring compliance with security standards and timely mitigation of organizational boundary security risks.
Actively participate in the bi-weekly accreditation boundary meetings and keep the AODR informed of any changes/updates to eRAMS/POA&Ms/STAR items or any new VPM and CM issues that may arise.
Provide technical and procedural cyber security advice to DOE, associate contractor partners, and Industrial Control Systems (ICS) teams as necessary.
Oversee operational information systems security implementation programs.
Coordinate with Information System Security Officer (ISSO) or PSO on approval of External Information Systems (e.g. guest systems, interconnected system with another organization).
Oversee ISSOs to ensure they follow established policies and procedures and timelines.
Ensure CM policies and procedures for authorizing the use of hardware/software on an IT system are followed. Any additions, changes or modifications to hardware, software, or firmware must be coordinated with the AODR prior to the addition, change or modification. ISSM shall have authority to veto any proposed change they feel is detrimental to security in boundaries under their purview. Appeals on an ISSM/ISSO veto may be taken to the AODR.
Ensure approved procedures are used for sanitizing and releasing system components and media as necessary.
Ensure proper measures are taken when cyber security incident or vulnerability is discovered.
Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures.
Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs).Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance.
Manage, maintain, and execute the information security continuous monitoring plan.
Ensure a record is maintained of all security-related vulnerabilities and ensure serious or unresolved violations are reported to the AODR; and assess changes to the system, its environment, and operational needs that could affect the security authorization.
Other related tasks as assigned.
Support information technology (IT) security goals and objectives and reduce overall organizational risk; Advise senior management (e.g., Chief Information Security Officer [CISO] and Chief Information Officer [CIO] on risk levels and security posture.); Advise appropriate senior leadership of changes affecting the organization's cybersecurity posture; Communicate the value of information technology (IT) security.
Knowledge, Skills, and Abilities:
Highly organized individual with exceptional communication skills, ensuring all stakeholders are consistently informed and updated as required.
Excellent written and oral communication skills (writing samples may be requested).
Attention-to-detail is critical, proven ability to look closely at your work to identify and correct errors, spot and improve weaknesses and produce a near-perfect end-result.
Ability to identify problems, brainstorm and analyze answers, and implement the best solutions.
Ability to develop and review security related procedures or processes and reports.
Demonstrated ability to provide clear, precise, and factual information to senior leaders, team members, and external stakeholders.
Capable of attending all customer-required meetings and promptly providing responses as requested.
Familiarity with applicable regulations affecting Cyber Security NIST 800 Series Standards.
Clearance:
Must possess (or be able to obtain) a “Q” level security clearance.
Education:
A bachelor's degree in information technology systems, computer science, or related field and experience in information technology systems or related area. Relevant experience may be substituted for education on a year-for-year basis.
Experience:
7+ years in IT security or related field.
Authority to Operate Life Cycle (ATO), Risk Management, POAMS & Milestones
Certification:
Highly desired certifications:
Certified Information System Security Professional (CISSP)
Certified Information Security Manager (CISM)
Benefits
Covers 100% of employee benefit premiums, including Medical (PPO or HDHP Option), Vision, Dental
Matching 401K
Short- and Long-Term Disability
Pet Insurance
Professional Development/Education Reimbursement
Parking and Transit Benefits for NY, NJ, ATL, and DC Metro areas
Other Duties:
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
Principal, Cyber Security Engineer
Cyber security analyst job in Charleston, SC
Are you searching for an opportunity to take your career to the next level? Ignite Digital Services is a fast-growing digital transformation company serving the national security sector. Our small business applies data science, program management and technical domain expertise to help clients implement data-driven approaches that maximize operational efficiencies.
We've redefined what it means to be a leader in our industry by creating and maintaining effective and rewarding working relationships with our clients, partners and internal team members. Our company culture is built upon a team-based approach, which offers continuous opportunities for personal growth and innovation, while providing unmatched value to our clients.
Perks of Working at Ignite Digital Services:
Competitive pay and benefits, including PTO
Education stipends and referral bonuses
Compelling work with the U.S. federal government
Strong emphasis on volunteer and community engagement
Opportunity to shape the future of our industry
Supportive colleagues and management who invest in your growth
Ignite Digital, has an exciting opportunity for a Principal, Cyber Security Engineer in Charleston, SC to support our client engagements within the federal government. The ideal candidate is a self-starter with strong cybersecurity skills and a strong work ethic. This position serves an important role in supporting a DevSecOps software development program and producing business process improvements. The individual will implement state-of-the-art best cybersecurity practices to ensure software code meets rigorous security audits and testing.
Responsibilities:
Evaluate, develop, and implement cybersecurity code review solutions within current business processes to optimize efficiencies in collaboration with software developers.
Identify methods to collect, analyze, and manage data with the goal of making recommendations to accelerate the Risk Management Framework process within a DevSecOps environment.
Conducts vulnerability testing and scanning, incident response, disaster recovery, and business continuity planning and provides analytical support for security policy development and analysis.
Evaluated incident response procedures and capabilities through Red Team exercises.
Exploited system and network vulnerabilities and misconfigurations for the purpose of gathering data from target or adversary automated information systems or networks and to enable operations and intelligence collection capabilities.
Monitored, analyzed, and detected Cyber events and incidents within information systems and networks.
Planned, implemented, managed, monitored and upgraded security measures for the protection of the organizations data, systems and networks.
Developed security assessment plans for systems, including the objectives, scope, schedule, required documentation, possible risks, and other logistical items for security assessments; developed cloud service provider testing approach from security perspective.
Evaluate the performance and applicability of software code review tools against customer and client requirements
Foster collaborative business relationships with stakeholders, business partners, and team members
Assist in the training and development of the command workforce to increase the ability to produce secure software code
Minimum Qualifications:
Ability to obtain a DoD security clearance
Bachelor of Science Degree in Engineering, Computer Science or Information Systems
Fifteen (15) years in cyber security to include: Maintained the information security activities to preserve the availability, integrity, and confidentiality of information resources in compliance with applicable security policies and standards.
Experience performing cybersecurity requirements definition, security risk assessment, systems analysis, systems design, security test and evaluation, certification and accreditation, and systems hardening.
Demonstrated experience supporting Risk Management Framework (RMF)/ FedRAMP system certification.
Demonstrated ability to take initiative and work independently and quickly transition to reassess priorities.
Must have Security+ certification
Preferred Qualifications:
Active DoD security clearance
Knowledge of the system development life cycle, software project management approaches and requirements, design and test techniques including experience working in a DevOps/DevSecOps delivery environment
Experience in mentoring/training/coaching others in technical concepts
Adapts quickly to new situations, is willing to learn new technologies and works well in a team environment, leading individual projects without the need for supervision
*Ability to obtain a DoD Government Security Clearance is mandatory for this position*
Salary: $150k+ to align with education, certification, & experience
Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information.
Ignite Digital Services is a Small Business committed to providing exceptional service to government agencies at competitive prices. The capabilities and experience of our staff and our extensive industry relationships distinguish Ignite Digital Services among government contractors.
Equal Opportunity Employer/Veterans/Disabled
For individuals who would like to request an accommodation, please visit ********************** (CA) or ********************** (SC) or contact Human Resources. Ignite Digital Services will not make any posting or employment decision that does not comply with applicable laws relating to labor and employment, equal employment opportunity, employment eligibility requirements or related matters. Nor will Ignite Digital Services require, in a posting or otherwise, U.S. citizenship or lawful permanent residency in the U.S. as a condition of employment except as necessary to comply with law, regulation, executive order, or federal, state, or local government contract.
OFCCP'S Pay Transparency Rule EEO is the Law Poster
Auto-ApplyCyber Engineer III
Cyber security analyst job in Charleston, SC
Cyber Engineer III Overview: ITC Defense is seeking to hire a Cyber Engineer III in support of U.S. Navy /Air Force CYP (Child Youth Programs) CCTV Lifecycle Support Service program. Responsibilities:
Design, implement, and maintain security controls and architectures across networks, systems, and applications in alignment with NIST, ISO 27001, CIS, and Zero Trust principles.
Evaluate, integrate, and manage security tools and technologies, including SIEM, SOAR, EDR, IDS/IPS, DLP, and IAM solutions.
Lead or support advanced threat detection, incident response, forensic analysis, and remediation activities.
Conduct threat modeling, security design reviews, and root cause analysis for new and existing systems.
Perform system security assessments, risk analyses, and vulnerability management, including remediation tracking.
Coordinate and validate penetration testing efforts and report on security metrics and risk posture.
Support compliance, audit, and ATO activities (e.g., NIST 800-53, NIST 800-171, CMMC, FedRAMP).
Develop, maintain, and improve security documentation, policies, procedures, and incident response playbooks.
Other duties as assigned.
Minimum Qualifications:
Master's degree in Cybersecurity, Computer Engineering, Electrical Engineering, Electronics Engineering, or Mathematics with a concentration in Computer Science (or equivalent).
Minimum of ten (10) years of demonstrated experience preparing, implementing, and ensuring compliance with cybersecurity policies and standards.
DoD 8570.1M-compliant certification at one or more of the following levels, as required by PWS tasking:
Information Assurance Management (IAM) Level I
Information Assurance Technical (IAT) Level I
Information Assurance System Architect and Engineer (IASAE) Level I
Experience supporting Assessment and Authorization (A&A) activities, including planning, implementation, and ongoing compliance.
Experience designing, upgrading, monitoring, and maintaining cybersecurity measures to improve cyber defense and ensure network resiliency.
Proven experience assessing cybersecurity vulnerabilities, performing risk analysis, and developing and implementing remediation or risk mitigation strategies.
Experience ensuring security controls are in place to protect digital files and electronic infrastructure.
Experience responding to and reporting on cybersecurity incidents and security breaches.
Preferred Qualifications:
Experience with NIST, CMMC, Zero Trust, and cloud security frameworks (AWS, Azure, GCP).
Hands-on expertise with security tools (SIEM, SOAR, EDR, IDS/IPS, DLP, IAM) and vulnerability management.
Strong analytical, problem-solving, and critical-thinking skills to assess risks and develop solutions.
Excellent communication, collaboration, and mentoring abilities for cross-functional teams.
Why work at ITC Defense:
Employer Supplemented Health Insurance
Employer Paid Dental and Vision Insurance
Employer Paid Life and AD&D Insurance
3% Biweekly 401(k) Contribution
Paid Time Off
Tuition and Certification Reimbursement
Competitive Salaries with Performance Incentives
A positive working environment with supportive teammates and leadership
ITC Defense Corp. is committed to creating a diverse environment and is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or protected veteran status. U.S. Citizenship is required for most positions. This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Duties, responsibilities and activities may change, or new ones may be assigned at any time with or without notice. Employment with ITC is at-will. For further information on our equal opportunity protections as part of the employment process, please see **************************************************************** and ***********************************************************************************************
ACCESSIBILITY- Candidates must be able to perform the essential functions of the position satisfactorily and that, if requested, reasonable accommodation may be made to enable employees with disabilities to perform the essential functions of their job, absent undue hardship. If you are a qualified individual with a disability or a disabled veteran, you have the right to request a reasonable accommodation for purposes of participating in the application/selection process with ITC. Please refer to our website ************************** for further information on all our EEO/VEVRAA policies.
Thank you for your interest in ITC Defense!
Auto-ApplyProduct Cyber Security Engineer II
Cyber security analyst job in Fort Mill, SC
**_The future is what you make it._** _When you join Honeywell, you become a member of our global team of thinkers, innovators, dreamers and doers who make the things that make the future. That means changing the way we fly, fueling jets in an eco-friendly way, keeping buildings intelligent and safe and even making it possible to breathe on Mars_
**_Are you ready to help us make the future?_**
**Honeywell Productivity Solutions and Services (PSS)** partners with end users on their digital transformation journeys by harnessing Honeywell's three megatrends: the growth of the connected workforce, the rise of automation and data analytics, and the shift toward sustainable solutions. We provide connected solutions that enhance efficiency, reduce costs, and increase revenues, featuring cutting-edge hardware, software, and automation technologies, including industry-leading mobile computers, data capture devices, and cloud-based software. With over 20 years of experience and a passion for innovation, we continuously push technological boundaries to ensure our customers succeed in their digital transformation, optimizing operations while embracing these megatrends.
Honeywell PSS within the Industrial Automation (IA) business unit, supports industries such as retail, healthcare, logistics, and distribution, empowering organizations to optimize their workforce, confidently utilize data, and shape a successful, sustainable future. Honeywell PSS offers a diverse range of products designed to enhance operational efficiency and productivity across various industries including mobile computing devices, scanning & imaging solutions, data capture devices, inventory management software, voice-enabled devices, industrial automation and IoT-enabled technologies. For more information: Productivity Solutions Products | Honeywell (***********************************************************************
**As a Product Cyber Security Engineer II,** you will be an integral part of the IA Product Security Team and will be responsible to provide product security expertise to product development teams throughout all phases of the SDLC for our retail, logistics & industrial automation products
As an Engineer II, you will work alongside a team of experienced engineers on challenging projects that will enhance your problem-solving abilities, help you refine your skills and broaden your understanding of the field. We are committed to supporting your career journey through mentorship, training, and hands-on experiences that foster both personal and professional growth.
+ Support NPI (New Product Introduction) security process activities including threat modeling, final security reviews, threat vulnerability assessment, etc. for all software and firmware development in IA(SPS)
+ Audit key process deliverables related to security for correctness and completeness.
+ Drive efforts with the development teams to quantify residual product risk and identification of appropriate security controls.
+ Provide product security related coaching/mentoring and security expertise for all software and firmware development teams in IA(SPS)
+ Help engineering and Product Management teams identify relevant security requirements
+ Drive a standardized set of security product requirements into product and service offerings.
+ Lead and coordinate cross-functional activities for incident response
_At Honeywell, our people leaders play a critical role in developing and supporting our employees to help them perform at their best and drive change across the company. Help to build a strong, diverse team by recruiting talent, identifying, and developing successors, driving retention and engagement, and fostering an inclusive culture._
**YOU MUST HAVE**
+ Bachelor's degree in computer science, software engineering, cyber security or equivalent
+ Cyber security capabilities and software engineering skills
+ Knowledge of secure software development lifecycle and practices such as threat modeling, security reviews, penetration tests, and security incident response
+ 1 to 3 years of software development/Assurance testing with at least 1 year in developing secure systems
+ Understanding of security by design principles and architecture level security concepts
+ Up to date knowledge of current and emerging security threats and techniques for exploiting security vulnerabilities
**WE VALUE**
+ Certifications in security and privacy demonstrating deep practical knowledge such as CSSLP or CISSP
+ Experience and knowledge of penetration testing methodologies and tools
+ Understanding of Agile software development practices
+ Excellent communication skills
**BENEFITS OF WORKING FOR HONEYWELL**
In addition to a competitive salary, leading-edge work, and developing solutions side-by-side with dedicated experts in their fields, Honeywell employees are eligible for a comprehensive benefits package. This package includes employer subsidized Medical, Dental, Vision, and Life Insurance; Short-Term and Long-Term Disability; 401(k) match, Flexible Spending Accounts, Health Savings Accounts, EAP, and Educational Assistance; Parental Leave, Paid Time Off (for vacation, personal business, sick time, and parental leave), and 12 Paid Holidays. For more information visit: Benefits at Honeywell (********************************
_The application period for the job is estimated to be 40 days from the job posting date; however, this may be shortened or extended depending on business needs and the availability of qualified candidates. Job Posting Date: Dec 18th, 2025_
Honeywell helps organizations solve the world's most complex challenges in automation, the future of aviation and energy transition. As a trusted partner, we provide actionable solutions and innovation through our Aerospace Technologies, Building Automation, Energy and Sustainability Solutions, and Industrial Automation business segments - powered by our Honeywell Forge software - that help make the world smarter, safer and more sustainable.
Honeywell is an equal opportunity employer. Qualified applicants will be considered without regard to age, race, creed, color, national origin, ancestry, marital status, affectional or sexual orientation, gender identity or expression, disability, nationality, sex, religion, or veteran status.
Cyber Engineer
Cyber security analyst job in North Charleston, SC
Overview/ Job Responsibilities
Sev1Tech is seeking a Cyber Engineer to support the Naval Information Warfare Center Atlantic (NIWC Atlantic) Expeditionary Enterprise Systems and Services (E2S2) Division. NIWC Atlantic provides design, acquisition, and sustainment services for Marine Corps Systems Command (MCSC) Information Technology (IT) systems).
In this role, the Cyber Engineer will be responsible for planning, implementing, upgrading, and monitoring cybersecurity measures to enhance cyber defense and maintain a resilient, secure network. The ideal candidate will assess vulnerabilities, propose and execute remediation and risk mitigation strategies, and ensure appropriate security controls are in place to safeguard digital assets and critical infrastructure.
This position requires a balance of technical expertise, hands-on problem solving, and experience in cybersecurity policy, compliance, and system protection in alignment with DoD standards and mission objectives.
Responsibilities:
Plan, implement, upgrade, and monitor cybersecurity measures to strengthen and maintain network defense.
Assess cybersecurity vulnerabilities for risk and propose and implement remediation actions or risk mitigation strategies.
Ensure security controls and countermeasures are properly implemented to protect digital files and networked systems.
Respond to cybersecurity incidents and breaches, re-establish protections, and produce required documentation and reports.
Prepare, implement, and ensure compliance with cybersecurity policies, including Assessment and Authorization (A&A) requirements.
Deploy and operate enterprise tools that support advanced threat hunting, detection, and monitoring capabilities.
Implement network inspection and packet capture systems to identify and mitigate potential threats.
Perform equipment installation and configuration, maintaining high standards of cable management and system organization.
Collaborate with engineering, cyber, and program teams to maintain compliance with DoD, NIWC Atlantic, and MCSC cybersecurity standards.
Minimum Qualifications
Active Top Secret Level Clearance
Three (3) years of notable experience preparing, implementing, and ensuring compliance with cybersecurity policy, including Assessment and Authorization (A&A) requirements.
Planning, implementing, upgrading, and monitoring cybersecurity measures to improve cyber defense and maintain resilient networks.
Assessing cybersecurity vulnerabilities for risk and developing remediation or mitigation strategies.
Ensuring appropriate security controls are in place to safeguard digital files and electronic infrastructure.
Responding to security incidents and breaches, re-establishing protections, and preparing required reports and documentation.
Minimum requirement noting a combination of these skills and experiences is preferred:
SIEM Platforms: Azure Sentinel, Splunk, or ElasticSearch for event correlation and incident analysis.
Network Visibility Tools: Gigamon, NetFlow, or equivalent for enhanced traffic monitoring and flow analysis.
Firewall Technologies: Experience configuring and maintaining Palo Alto Networks NGFW or similar solutions.
Big Data Platforms: Familiarity with BDP-CHAOS (USMC Big Data Platform for Cyber Information) or related analytics environments.
SSL Break-and-Inspect solutions for outbound traffic inspection and decryption.
Working knowledge of DoD cybersecurity frameworks and defense IT compliance standards.
Education & Certifications:
Bachelor's degree in Cybersecurity, Computer, Electrical, or Electronics Engineering, or Mathematics with a concentration in Computer Science, or equivalent.
The individual shall be certified as Information Assurance Management (IAM), Information Assurance Technical (IAT), or Information Assurance System Architect and Engineer (IASAE) Level I (position-based) per DoD 8570.1M.
Must be willing to travel up to 60 days per year, including multiple week-long trips to CONUS and OCONUS locations in support of mission requirements.
About Sev1Tech LLC
Welcome to Sev1Tech! Founded in 2010, we are proud to be a leading provider of IT modernization, engineering, and program management solutions. Our commitment is to deliver exceptional program and IT support services that empower critical missions for both Federal and Commercial clients.
At Sev1Tech, our mission is clear: Build better companies. Enable better government. Protect our nation. Build better humans across the country. We believe that through innovation and dedication, we can make a significant impact on the communities we serve.
Join the Sev1Tech family, where your potential for greatness is limitless! Here, you will not only achieve remarkable accomplishments but also enjoy a fulfilling and rewarding career progression. We invite you to explore opportunities with us and become part of a team that values your contributions and growth.
Ready to take the next step? Apply directly through our website: Sev1Tech Careers and use the hashtag #join Sev1Tech to connect with us on social media!
For any additional questions or to submit referrals, feel free to reach out to ***********************.
Auto-ApplyProduct Cyber Security Engineer II
Cyber security analyst job in Fort Mill, SC
The future is what you make it.
When you join Honeywell, you become a member of our global team of thinkers, innovators, dreamers and doers who make the things that make the future. That means changing the way we fly, fueling jets in an eco-friendly way, keeping buildings intelligent and safe and even making it possible to breathe on Mars
Are you ready to help us make the future?
Honeywell Productivity Solutions and Services (PSS) partners with end users on their digital transformation journeys by harnessing Honeywell's three megatrends: the growth of the connected workforce, the rise of automation and data analytics, and the shift toward sustainable solutions. We provide connected solutions that enhance efficiency, reduce costs, and increase revenues, featuring cutting-edge hardware, software, and automation technologies, including industry-leading mobile computers, data capture devices, and cloud-based software. With over 20 years of experience and a passion for innovation, we continuously push technological boundaries to ensure our customers succeed in their digital transformation, optimizing operations while embracing these megatrends.
Honeywell PSS within the Industrial Automation (IA) business unit, supports industries such as retail, healthcare, logistics, and distribution, empowering organizations to optimize their workforce, confidently utilize data, and shape a successful, sustainable future. Honeywell PSS offers a diverse range of products designed to enhance operational efficiency and productivity across various industries including mobile computing devices, scanning & imaging solutions, data capture devices, inventory management software, voice-enabled devices, industrial automation and IoT-enabled technologies. For more information: Productivity Solutions Products | Honeywell
YOU MUST HAVE
Bachelor's degree in computer science, software engineering, cyber security or equivalent
Cyber security capabilities and software engineering skills
Knowledge of secure software development lifecycle and practices such as threat modeling, security reviews, penetration tests, and security incident response
1 to 3 years of software development/Assurance testing with at least 1 year in developing secure systems
Understanding of security by design principles and architecture level security concepts
Up to date knowledge of current and emerging security threats and techniques for exploiting security vulnerabilities
WE VALUE
Certifications in security and privacy demonstrating deep practical knowledge such as CSSLP or CISSP
Experience and knowledge of penetration testing methodologies and tools
Understanding of Agile software development practices
Excellent communication skills
BENEFITS OF WORKING FOR HONEYWELL
In addition to a competitive salary, leading-edge work, and developing solutions side-by-side with dedicated experts in their fields, Honeywell employees are eligible for a comprehensive benefits package. This package includes employer subsidized Medical, Dental, Vision, and Life Insurance; Short-Term and Long-Term Disability; 401(k) match, Flexible Spending Accounts, Health Savings Accounts, EAP, and Educational Assistance; Parental Leave, Paid Time Off (for vacation, personal business, sick time, and parental leave), and 12 Paid Holidays. For more information visit: Benefits at Honeywell
The application period for the job is estimated to be 40 days from the job posting date; however, this may be shortened or extended depending on business needs and the availability of qualified candidates. Job Posting Date: Dec 18th, 2025
As a Product Cyber Security Engineer II, you will be an integral part of the IA Product Security Team and will be responsible to provide product security expertise to product development teams throughout all phases of the SDLC for our retail, logistics & industrial automation products
As an Engineer II, you will work alongside a team of experienced engineers on challenging projects that will enhance your problem-solving abilities, help you refine your skills and broaden your understanding of the field. We are committed to supporting your career journey through mentorship, training, and hands-on experiences that foster both personal and professional growth.
Support NPI (New Product Introduction) security process activities including threat modeling, final security reviews, threat vulnerability assessment, etc. for all software and firmware development in IA(SPS)
Audit key process deliverables related to security for correctness and completeness.
Drive efforts with the development teams to quantify residual product risk and identification of appropriate security controls.
Provide product security related coaching/mentoring and security expertise for all software and firmware development teams in IA(SPS)
Help engineering and Product Management teams identify relevant security requirements
Drive a standardized set of security product requirements into product and service offerings.
Lead and coordinate cross-functional activities for incident response
At Honeywell, our people leaders play a critical role in developing and supporting our employees to help them perform at their best and drive change across the company. Help to build a strong, diverse team by recruiting talent, identifying, and developing successors, driving retention and engagement, and fostering an inclusive culture.
Auto-ApplyEngineer, Information Security and Risk
Cyber security analyst job in Columbia, SC
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Security Analyst
Cyber security analyst job in Clover, SC
REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):
6 years information security experience
Excellent written skills; Proven work experience in process improvement
Ability to identify processes that must be in place for an IT organization to be efficient
Extensive knowledge of IRS Pub 1075, NIST 800-53, ITIL, and CJIS
Process Management
ITIL
Business Analysis experience to include data flow diagrams, requirements specifications, use case scenarios, and acceptance testing.
Ability to work with security technicians to develop detailed procedures;
Ability to quickly grasp complex technical concepts and make them easily understandable in both text and diagrams/flow charts
Ability to deliver high quality documentation with attention to detail.
REQUIRED EDUCATION: Bachelor's Degree in a relevant field of work or equivalent work experience.
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Engineer
Cyber security analyst job in Greer, SC
Proterra offers a dynamic and supportive workplace where our employees can thrive personally and professionally. With cutting-edge facilities and groundbreaking projects, Proterra offers unique opportunities to grow, collaborate, and lead transformative change in the electrification of heavy-duty transportation and equipment.
Our commitment to innovation extends beyond our battery solutions to our people, where we create an environment where everyone feels valued, supported, and empowered to drive change for the earth. Here at Proterra we strive to foster a culture of inclusivity, valuing diverse perspectives and encouraging bold ideas, allowing our employees to bring their full selves to work. Our employees benefit from competitive total rewards packages, and opportunities to develop professionally.
Position Overview:â¯
The Information Security Engineer will be responsible for developing, enhancing, and executing Information Security Operations at Proterra.⯠In this position you will assist with the maintenance and implementation of IT security systems to protect Proterra's corporate, manufacturing, cloud and IoT environments from cyber-attacks. You will maintain and lead incident response and escalations with our security operations center, be responsible for vulnerability management and participate in the creation or improvement of company security policies/ procedures.⯠You will be responsible for conducting/leading risk assessments and participating in and supporting security assessments and audits. Additionally, you will be assisting with evaluation, setup and utilization of new security products and technologies.â¯
About the Role - You will:â¯
Identify and analyze potential threat activity targeting client networks via monitoring systems, alerts, vulnerabilities, SIEM tools and network traffic and respond for immediate remediation.
Work with cross functional teams to support security requirements to protect organization's corporate, manufacturing, cloud and IoT environments from cyber-attacks.
Oversee and maintain existing security tools as well as overall enterprise security systems that include network and/or host-based intrusion detection systems, anti-virus/advanced EDR, SIEM/event correlation, file integrity monitoring, full packet captures, computer forensics, encryption, vulnerability management, data loss prevention and application scanning.â¯
Responsible for the coordination and actions needed for remediation generated by incident reports and manufacture recommended patching and hotfixes.
Identify and analyze potential threat activity targeting client networks via monitoring systems, alerts, vulnerabilities, SIEM tools and network traffic and respond for immediate remediation.
Work with cross functional teams to support security requirements to protect organization's corporate, manufacturing, cloud and IoT environments from cyber-attacksâ¯â¯
Oversee and maintain existing security tools as well as overall enterprise security systems that include network and/or host-based intrusion detection systems, anti-virus/advanced EDR, SIEM/event correlation, file integrity monitoring, full packet captures, computer forensics, encryption, vulnerability management, data loss prevention and application scanning.â¯
Responsible for the coordination and actions needed for remediation generated by incident reports and manufacture recommended patching and hotfixes.
Assist Crowdstrike Falcon Complete team in remediation of critical information security incidents in coordination with 3rd party SOC team.â¯
Implement and maintain security controls and have a suitable knowledge of existing cyber threats to infrastructure and clouded environments.â¯
Participate in scheduled security assessment activities and projects to ensure industry compliance.â¯
Initiate and maintain Security Incident Response Plan (SIRT) and After-Action Reports (AARs) to maintain operational continuityâ¯
Identify, analyze and interpret threat actors and malicious activity in client environments act upon and take the appropriate actions towards remediation and documentation.â¯
Differentiate between potential intrusion attempts and pinpoint false alarmsâ¯by working with EDR, Identity Protection and NextGen SIEM to develop resolution plans.
Perform 3rd party vendor assessments and fulfill Proterra security assessments requirements
Triage and respond to security events - serve as a primary responder for incidents, taking ownership of incidents and tracking through resolution.â¯
Performs other related duties as assigned.â¯
Your Experience Includes:
3-5 years of related information technology infrastructure experience⯠with identity and access management [IAM], SSO solutions including (SAML 2, OAuth 2, OIDC).
Some experience in securing enterprise networks, including firewalls, VPNs, intrusion detection/prevention systems (IDS/IPS), and secure network protocols (e.g., IPsec, SSL/TLS) heavy emphasis in SaaS apps such as Crowdstrike Falcon Complete, Netskope DLP, Nessus Tenable and asset management platforms such as Axionus.
Overall Knowledge of endpoint protection technologies (e.g., anti-malware, EDR, DLP), and experience in managing and securing workstations, mobile devices, and servers.
Have participated in penetration testing, vulnerability assessments, and red teaming exercises.
General understating of industry standards, compliance, and legal requirements (ISO 27001, FedRAMP, NIST 800-171, NIST 800-53, SOC2, etc.)â¯
Excellent trouble-shooting abilities in software and hardware and be able to lead outage calls and trouble-shooting conversations until resolved and provide detailed root cause analysis reports.â¯
Above average understanding in vulnerability reporting using Saas platforms such as Nessus Tenable.
Education:
Bachelor's degree in computer science, Information Security, Electrical Engineering or Management Information Systems preferred. Equivalent years of consecutive IT security experience with recognized industry certifications may be considered.
Certifications:
CISSP, CASP+, SSCP+, or other relevant security certificatesâ¯
Certified Ethical Hacking (CEH) CISSP, CISA
Network+, Security+, Linux+ or combination of similar certificates acceptable.
Applicants must be authorized to work for any employer in the U.S. There is no immigration sponsorship available for this role (ex: H1-B, OPT, CPT, TN or any other employment sponsorship).â¯
#LI-BJ1
Information System Security Officer
Cyber security analyst job in Charleston, SC
The U.S. Department of State (DoS), Comptroller and Global Financial Services (CGFS), Chief Information Officer, Information Systems Security Office (CGFS/CIO/ISSO) requires the contractor to provide analytical and coordination support in the Information Systems Security Office (ISSO) as a Security Analyst in applying interrelationships of multiple Cybersecurity specialties; IT architecture; new IA developments and applications; emerging technologies and their applications to business processes; IT security concepts, standards, and methods; project management principles and methods.
Minimum Requirements
Four-year degree in computer science, business, or closely related area.
Technical certification in computer systems security and a minimum of 5 years' experience in intrusion detection, vulnerability assessments, and network diagnostics.
Experience with DoS computer security policies and guidelines.
Security+ certification is required; CompTIA+ certification is preferred.
Job Responsibilities
CGFS Charleston ISSO Information Assurance and Risk Management Framework (RMF).
User creation and conditional email assignment of user and administrative accounts on CGFS General Support Systems.
Active role in network and systems design to ensure that appropriate systems security policies and procedures are contemplated and introduced into designs at the outset.
Assess breaches of security to determine their impact on system operations and the confidentiality, integrity, and reliability of the information stored and manipulated within the system. Applies findings to the development of corrective measures and user awareness.
Creation and maintenance of users for CGFS Financial Applications.
Creation and updating of Treasury Keys for supported applications.
Storing and distribution of classified peripheral devices.
Creation and maintenance of network drive folder file permissions.
Documenting visiting Government and Non-Government visitor's laptops.
Support internal and external access management audits.
Create and maintain ISO 9001 documentation for engineering and access management efforts Ability to communicate technical as well as non-technical information clearly, both orally and in writing.
Brief and maintain documentation for all users on automated information systems (AIS).
SharePoint development and maintenance.
Provide tier III support for all Information Systems Security.
Create, modify, and delete user accounts on automated information systems.
Security Clearance Requirement
All contractors supporting this Department must be able to either possess or obtain a security clearance of “Top Secret/SCI.”
Important note to consider
: A Secret Clearance will open a lot of other doors for your career in the Government to include possibilities of being hired directly.
Work Schedule
The employee will work an 8-hour shift between the hours of 6:15 am to 6:00 pm with a non-compensated 45-minute lunch (See your Project Manager for work schedule and department policies). Additional hours may be required and must be authorized by your Project Manager and DoS Management. This position requires 5 days on-site.
Software Systems Utilized:
Basic knowledge and experience with Windows 2012/2016/or future elaborations Server network environment.
Basic knowledge and experience on personal computers running Windows 10 or future elaborations workstation in a Windows network environment.
Experience with PC workstation operations including word processing, spreadsheets, and electronic mail, as well as knowledge of Windows 10 or future elaborations system internals such as the registry.
Ability to communicate technical as well as non-technical information clearly, both orally and in writing.
Formal Job-Specific Training Requirements:
IA 201 - Information Assurance for System Administrators
Our Most Successful Employees in this Position Demonstrate:
An understanding of the mission and business functions of the organization.
An ability to build relationships with key personnel who have authority or ability to ensure compliance with security laws, regulations, guidance, and requirements.
An ability to troubleshoot issues while maintaining appropriate operational security posture.
Auto-ApplyInformation System Security Officer
Cyber security analyst job in Charleston, SC
Job Description
The U.S. Department of State (DoS), Comptroller and Global Financial Services (CGFS), Chief Information Officer, Information Systems Security Office (CGFS/CIO/ISSO) requires the contractor to provide analytical and coordination support in the Information Systems Security Office (ISSO) as a Security Analyst in applying interrelationships of multiple Cybersecurity specialties; IT architecture; new IA developments and applications; emerging technologies and their applications to business processes; IT security concepts, standards, and methods; project management principles and methods.
Minimum Requirements
Four-year degree in computer science, business, or closely related area.
Technical certification in computer systems security and a minimum of 5 years' experience in intrusion detection, vulnerability assessments, and network diagnostics.
Experience with DoS computer security policies and guidelines.
Security+ certification is required; CompTIA+ certification is preferred.
Job Responsibilities
CGFS Charleston ISSO Information Assurance and Risk Management Framework (RMF).
User creation and conditional email assignment of user and administrative accounts on CGFS General Support Systems.
Active role in network and systems design to ensure that appropriate systems security policies and procedures are contemplated and introduced into designs at the outset.
Assess breaches of security to determine their impact on system operations and the confidentiality, integrity, and reliability of the information stored and manipulated within the system. Applies findings to the development of corrective measures and user awareness.
Creation and maintenance of users for CGFS Financial Applications.
Creation and updating of Treasury Keys for supported applications.
Storing and distribution of classified peripheral devices.
Creation and maintenance of network drive folder file permissions.
Documenting visiting Government and Non-Government visitor's laptops.
Support internal and external access management audits.
Create and maintain ISO 9001 documentation for engineering and access management efforts Ability to communicate technical as well as non-technical information clearly, both orally and in writing.
Brief and maintain documentation for all users on automated information systems (AIS).
SharePoint development and maintenance.
Provide tier III support for all Information Systems Security.
Create, modify, and delete user accounts on automated information systems.
Security Clearance Requirement
All contractors supporting this Department must be able to either possess or obtain a security clearance of “Top Secret/SCI.”
Important note to consider
: A Secret Clearance will open a lot of other doors for your career in the Government to include possibilities of being hired directly.
Work Schedule
The employee will work an 8-hour shift between the hours of 6:15 am to 6:00 pm with a non-compensated 45-minute lunch (See your Project Manager for work schedule and department policies). Additional hours may be required and must be authorized by your Project Manager and DoS Management. This position requires 5 days on-site.
Software Systems Utilized:
Basic knowledge and experience with Windows 2012/2016/or future elaborations Server network environment.
Basic knowledge and experience on personal computers running Windows 10 or future elaborations workstation in a Windows network environment.
Experience with PC workstation operations including word processing, spreadsheets, and electronic mail, as well as knowledge of Windows 10 or future elaborations system internals such as the registry.
Ability to communicate technical as well as non-technical information clearly, both orally and in writing.
Formal Job-Specific Training Requirements:
IA 201 - Information Assurance for System Administrators
Our Most Successful Employees in this Position Demonstrate:
An understanding of the mission and business functions of the organization.
An ability to build relationships with key personnel who have authority or ability to ensure compliance with security laws, regulations, guidance, and requirements.
An ability to troubleshoot issues while maintaining appropriate operational security posture.
Cyber Security Analyst - GRC Support
Cyber security analyst job in Aiken, SC
Savannah River National Laboratory (SRNL) is seeking an energetic individual with good interpersonal skills to join the Cyber Assurance, Governance, Risk Management and Compliance team! The selected individual will assist the Information Systems Security Officer (ISSO) and GRC team with NIST Risk Management Framework (RMF) processes to ensure a secure operational security posture is in place and maintained throughout the lifecycle of the system and/or network.
Minimum Qualifications:
Bachelor's degree in Computer Science, Information Assurance, or related field
4-6 years of relevant experience in NIST Risk Management Framework and Control Sets (i.e., NIST 800-37 and NIST 800-53) as a federal-contractor employee
For ability to obtain and maintain a security clearance, US Citizenship is Legally Required
Preferred Qualifications:
Working knowledge and experience with the NIST Risk Management Framework and Control Sets (i.e., NIST 800-37 and NIST 800-53) in a federal contractor role
Attention to detail and strong written communication skills (clear, concise for evidence/control implementation descriptions)
Experience with information assurance tools (GRC, Tenable.SC, Nessus, Splunk, etc.)
Ability to quickly learn new technologies, concepts, and processes
Demonstrated ability to work collaboratively in a team environment with good interpersonal skills
Active DOE L clearance
Data entry, updates and maintenance of System Security Plans and other documents/evidence in the GRC tool
Executing scans security scans (compliance and vulnerability related)
Tracking status of temporary risk findings to closure and gathering remediation evidence
Pulling configuration compliance reports, STIG checklists, CIS benchmarks
Assist with RMF Continuous Monitoring activities and new project Risk Assessments
Assist Project Security Officers and ISSOs with preparation of authorization packages for new projects and accreditation boundary
Assist with entry of new risks, updates or maintenance in the risk register
Assist in performing security impact analysis using approved security policies and SSPs and provide recommendations for meeting requirements with adequate security controls that align with business objectives.
Work effectively in a team environment to resolve issues and contribute to continuous process improvement efforts.
Participate/assist with compliance assessments/audits and data calls.
Interact with customers and peers in a professional and responsive manner.
Auto-ApplyCyber Engineer III
Cyber security analyst job in Charleston, SC
Location: Charleston, SC Cyber Engineer III Overview: ITC Defense is seeking to hire a Cyber Engineer III in support of U.S. Navy /Air Force CYP (Child Youth Programs) CCTV Lifecycle Support Service program. Responsibilities:
Design, implement, and maintain security controls and architectures across networks, systems, and applications in alignment with NIST, ISO 27001, CIS, and Zero Trust principles.
Evaluate, integrate, and manage security tools and technologies, including SIEM, SOAR, EDR, IDS/IPS, DLP, and IAM solutions.
Lead or support advanced threat detection, incident response, forensic analysis, and remediation activities.
Conduct threat modeling, security design reviews, and root cause analysis for new and existing systems.
Perform system security assessments, risk analyses, and vulnerability management, including remediation tracking.
Coordinate and validate penetration testing efforts and report on security metrics and risk posture.
Support compliance, audit, and ATO activities (e.g., NIST 800-53, NIST 800-171, CMMC, FedRAMP).
Develop, maintain, and improve security documentation, policies, procedures, and incident response playbooks.
Other duties as assigned.
Minimum Qualifications:
Master's degree in Cybersecurity, Computer Engineering, Electrical Engineering, Electronics Engineering, or Mathematics with a concentration in Computer Science (or equivalent).
Minimum of ten (10) years of demonstrated experience preparing, implementing, and ensuring compliance with cybersecurity policies and standards.
DoD 8570.1M-compliant certification at one or more of the following levels, as required by PWS tasking:
Information Assurance Management (IAM) Level I
Information Assurance Technical (IAT) Level I
Information Assurance System Architect and Engineer (IASAE) Level I
Experience supporting Assessment and Authorization (A&A) activities, including planning, implementation, and ongoing compliance.
Experience designing, upgrading, monitoring, and maintaining cybersecurity measures to improve cyber defense and ensure network resiliency.
Proven experience assessing cybersecurity vulnerabilities, performing risk analysis, and developing and implementing remediation or risk mitigation strategies.
Experience ensuring security controls are in place to protect digital files and electronic infrastructure.
Experience responding to and reporting on cybersecurity incidents and security breaches.
Preferred Qualifications:
Experience with NIST, CMMC, Zero Trust, and cloud security frameworks (AWS, Azure, GCP).
Hands-on expertise with security tools (SIEM, SOAR, EDR, IDS/IPS, DLP, IAM) and vulnerability management.
Strong analytical, problem-solving, and critical-thinking skills to assess risks and develop solutions.
Excellent communication, collaboration, and mentoring abilities for cross-functional teams.
Why work at ITC Defense:
Employer Supplemented Health Insurance
Employer Paid Dental and Vision Insurance
Employer Paid Life and AD&D Insurance
3% Biweekly 401(k) Contribution
Paid Time Off
Tuition and Certification Reimbursement
Competitive Salaries with Performance Incentives
A positive working environment with supportive teammates and leadership
ITC Defense Corp. is committed to creating a diverse environment and is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or protected veteran status. U.S. Citizenship is required for most positions. This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Duties, responsibilities and activities may change, or new ones may be assigned at any time with or without notice. Employment with ITC is at-will. For further information on our equal opportunity protections as part of the employment process, please see **************************************************************** and ***********************************************************************************************
ACCESSIBILITY- Candidates must be able to perform the essential functions of the position satisfactorily and that, if requested, reasonable accommodation may be made to enable employees with disabilities to perform the essential functions of their job, absent undue hardship. If you are a qualified individual with a disability or a disabled veteran, you have the right to request a reasonable accommodation for purposes of participating in the application/selection process with ITC. Please refer to our website ************************** for further information on all our EEO/VEVRAA policies.
Thank you for your interest in ITC Defense!
Powered by JazzHR
jPDNgXKqeE
Product Cyber Security Engineer II
Cyber security analyst job in Fort Mill, SC
The future is what you make it. When you join Honeywell, you become a member of our global team of thinkers, innovators, dreamers and doers who make the things that make the future. That means changing the way we fly, fueling jets in an eco-friendly way, keeping buildings intelligent and safe and even making it possible to breathe on Mars
Are you ready to help us make the future?
Honeywell Productivity Solutions and Services (PSS) partners with end users on their digital transformation journeys by harnessing Honeywell's three megatrends: the growth of the connected workforce, the rise of automation and data analytics, and the shift toward sustainable solutions. We provide connected solutions that enhance efficiency, reduce costs, and increase revenues, featuring cutting-edge hardware, software, and automation technologies, including industry-leading mobile computers, data capture devices, and cloud-based software. With over 20 years of experience and a passion for innovation, we continuously push technological boundaries to ensure our customers succeed in their digital transformation, optimizing operations while embracing these megatrends.
Honeywell PSS within the Industrial Automation (IA) business unit, supports industries such as retail, healthcare, logistics, and distribution, empowering organizations to optimize their workforce, confidently utilize data, and shape a successful, sustainable future. Honeywell PSS offers a diverse range of products designed to enhance operational efficiency and productivity across various industries including mobile computing devices, scanning & imaging solutions, data capture devices, inventory management software, voice-enabled devices, industrial automation and IoT-enabled technologies. For more information: Productivity Solutions Products | Honeywell
As a Product Cyber Security Engineer II, you will be an integral part of the IA Product Security Team and will be responsible to provide product security expertise to product development teams throughout all phases of the SDLC for our retail, logistics & industrial automation products
As an Engineer II, you will work alongside a team of experienced engineers on challenging projects that will enhance your problem-solving abilities, help you refine your skills and broaden your understanding of the field. We are committed to supporting your career journey through mentorship, training, and hands-on experiences that foster both personal and professional growth.
* Support NPI (New Product Introduction) security process activities including threat modeling, final security reviews, threat vulnerability assessment, etc. for all software and firmware development in IA(SPS)
* Audit key process deliverables related to security for correctness and completeness.
* Drive efforts with the development teams to quantify residual product risk and identification of appropriate security controls.
* Provide product security related coaching/mentoring and security expertise for all software and firmware development teams in IA(SPS)
* Help engineering and Product Management teams identify relevant security requirements
* Drive a standardized set of security product requirements into product and service offerings.
* Lead and coordinate cross-functional activities for incident response
At Honeywell, our people leaders play a critical role in developing and supporting our employees to help them perform at their best and drive change across the company. Help to build a strong, diverse team by recruiting talent, identifying, and developing successors, driving retention and engagement, and fostering an inclusive culture.
YOU MUST HAVE
* Bachelor's degree in computer science, software engineering, cyber security or equivalent
* Cyber security capabilities and software engineering skills
* Knowledge of secure software development lifecycle and practices such as threat modeling, security reviews, penetration tests, and security incident response
* 1 to 3 years of software development/Assurance testing with at least 1 year in developing secure systems
* Understanding of security by design principles and architecture level security concepts
* Up to date knowledge of current and emerging security threats and techniques for exploiting security vulnerabilities
WE VALUE
* Certifications in security and privacy demonstrating deep practical knowledge such as CSSLP or CISSP
* Experience and knowledge of penetration testing methodologies and tools
* Understanding of Agile software development practices
* Excellent communication skills
BENEFITS OF WORKING FOR HONEYWELL
In addition to a competitive salary, leading-edge work, and developing solutions side-by-side with dedicated experts in their fields, Honeywell employees are eligible for a comprehensive benefits package. This package includes employer subsidized Medical, Dental, Vision, and Life Insurance; Short-Term and Long-Term Disability; 401(k) match, Flexible Spending Accounts, Health Savings Accounts, EAP, and Educational Assistance; Parental Leave, Paid Time Off (for vacation, personal business, sick time, and parental leave), and 12 Paid Holidays. For more information visit: Benefits at Honeywell
The application period for the job is estimated to be 40 days from the job posting date; however, this may be shortened or extended depending on business needs and the availability of qualified candidates. Job Posting Date: Dec 18th, 2025
Engineer, Information Security and Risk
Cyber security analyst job in Columbia, SC
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Information Security Engineer
Cyber security analyst job in Greer, SC
Proterra offers a dynamic and supportive workplace where our employees can thrive personally and professionally. With cutting-edge facilities and groundbreaking projects, Proterra offers unique opportunities to grow, collaborate, and lead transformative change in the electrification of heavy-duty transportation and equipment.
Our commitment to innovation extends beyond our battery solutions to our people, where we create an environment where everyone feels valued, supported, and empowered to drive change for the earth. Here at Proterra we strive to foster a culture of inclusivity, valuing diverse perspectives and encouraging bold ideas, allowing our employees to bring their full selves to work. Our employees benefit from competitive total rewards packages, and opportunities to develop professionally.
Position Overview:
The Information Security Engineer will be responsible for developing, enhancing, and executing Information Security Operations at Proterra. In this position you will assist with the maintenance and implementation of IT security systems to protect Proterra's corporate, manufacturing, cloud and IoT environments from cyber-attacks. You will maintain and lead incident response and escalations with our security operations center, be responsible for vulnerability management and participate in the creation or improvement of company security policies/ procedures. You will be responsible for conducting/leading risk assessments and participating in and supporting security assessments and audits. Additionally, you will be assisting with evaluation, setup and utilization of new security products and technologies.
About the Role - You will:
* Identify and analyze potential threat activity targeting client networks via monitoring systems, alerts, vulnerabilities, SIEM tools and network traffic and respond for immediate remediation.
* Work with cross functional teams to support security requirements to protect organization's corporate, manufacturing, cloud and IoT environments from cyber-attacks.
* Oversee and maintain existing security tools as well as overall enterprise security systems that include network and/or host-based intrusion detection systems, anti-virus/advanced EDR, SIEM/event correlation, file integrity monitoring, full packet captures, computer forensics, encryption, vulnerability management, data loss prevention and application scanning.
* Responsible for the coordination and actions needed for remediation generated by incident reports and manufacture recommended patching and hotfixes.
* Identify and analyze potential threat activity targeting client networks via monitoring systems, alerts, vulnerabilities, SIEM tools and network traffic and respond for immediate remediation.
* Work with cross functional teams to support security requirements to protect organization's corporate, manufacturing, cloud and IoT environments from cyber-attacks
* Oversee and maintain existing security tools as well as overall enterprise security systems that include network and/or host-based intrusion detection systems, anti-virus/advanced EDR, SIEM/event correlation, file integrity monitoring, full packet captures, computer forensics, encryption, vulnerability management, data loss prevention and application scanning.
* Responsible for the coordination and actions needed for remediation generated by incident reports and manufacture recommended patching and hotfixes.
* Assist Crowdstrike Falcon Complete team in remediation of critical information security incidents in coordination with 3rd party SOC team.
* Implement and maintain security controls and have a suitable knowledge of existing cyber threats to infrastructure and clouded environments.
* Participate in scheduled security assessment activities and projects to ensure industry compliance.
* Initiate and maintain Security Incident Response Plan (SIRT) and After-Action Reports (AARs) to maintain operational continuity
* Identify, analyze and interpret threat actors and malicious activity in client environments act upon and take the appropriate actions towards remediation and documentation.
* Differentiate between potential intrusion attempts and pinpoint false alarms by working with EDR, Identity Protection and NextGen SIEM to develop resolution plans.
* Perform 3rd party vendor assessments and fulfill Proterra security assessments requirements
* Triage and respond to security events - serve as a primary responder for incidents, taking ownership of incidents and tracking through resolution.
* Performs other related duties as assigned.
Your Experience Includes:
* 3-5 years of related information technology infrastructure experience with identity and access management [IAM], SSO solutions including (SAML 2, OAuth 2, OIDC).
* Some experience in securing enterprise networks, including firewalls, VPNs, intrusion detection/prevention systems (IDS/IPS), and secure network protocols (e.g., IPsec, SSL/TLS) heavy emphasis in SaaS apps such as Crowdstrike Falcon Complete, Netskope DLP, Nessus Tenable and asset management platforms such as Axionus.
* Overall Knowledge of endpoint protection technologies (e.g., anti-malware, EDR, DLP), and experience in managing and securing workstations, mobile devices, and servers.
* Have participated in penetration testing, vulnerability assessments, and red teaming exercises.
* General understating of industry standards, compliance, and legal requirements (ISO 27001, FedRAMP, NIST 800-171, NIST 800-53, SOC2, etc.)
* Excellent trouble-shooting abilities in software and hardware and be able to lead outage calls and trouble-shooting conversations until resolved and provide detailed root cause analysis reports.
* Above average understanding in vulnerability reporting using Saas platforms such as Nessus Tenable.
Education:
* Bachelor's degree in computer science, Information Security, Electrical Engineering or Management Information Systems preferred. Equivalent years of consecutive IT security experience with recognized industry certifications may be considered.
Certifications:
* CISSP, CASP+, SSCP+, or other relevant security certificates
* Certified Ethical Hacking (CEH) CISSP, CISA
* Network+, Security+, Linux+ or combination of similar certificates acceptable.
Applicants must be authorized to work for any employer in the U.S. There is no immigration sponsorship available for this role (ex: H1-B, OPT, CPT, TN or any other employment sponsorship).
#LI-BJ1
Information System Security Officer
Cyber security analyst job in Charleston, SC
Department
Auto-Apply