Post job

Cyber security analyst jobs in West Columbia, SC

- 46 jobs
All
Cyber Security Analyst
Securities Analyst
Security Engineer
Information Security Engineer
Senior Cyber Security Analyst
Senior Security Analyst
Senior Security Engineer
  • Senior Cyber Security Analyst -(ISSM)

    DNI (Delaware Nation Industries 3.6company rating

    Cyber security analyst job in Aiken, SC

    DNI is on the lookout for a Senior Cyber Security Analyst - Information Systems Security Manager (ISSM) to deliver expert guidance in Information Systems Security and cybersecurity support for the Enterprise Information Services at the Department of Energy (DOE) Savannah River Operations Office (DOE-SR), located at the Savannah River Site (SRS) in Aiken, SC. Requirements Reports to the Chief Information Security Officer (CISO) and Program Manager. Oversee the Authority to Operate (ATO) lifecycle, manage risk assessments, develop and monitor Plan of Action and Milestones (POAMs), ensuring compliance with security standards and timely mitigation of organizational boundary security risks. Actively participate in the bi-weekly accreditation boundary meetings and keep the AODR informed of any changes/updates to eRAMS/POA&Ms/STAR items or any new VPM and CM issues that may arise. Provide technical and procedural cyber security advice to DOE, associate contractor partners, and Industrial Control Systems (ICS) teams as necessary. Oversee operational information systems security implementation programs. Coordinate with Information System Security Officer (ISSO) or PSO on approval of External Information Systems (e.g. guest systems, interconnected system with another organization). Oversee ISSOs to ensure they follow established policies and procedures and timelines. Ensure CM policies and procedures for authorizing the use of hardware/software on an IT system are followed. Any additions, changes or modifications to hardware, software, or firmware must be coordinated with the AODR prior to the addition, change or modification. ISSM shall have authority to veto any proposed change they feel is detrimental to security in boundaries under their purview. Appeals on an ISSM/ISSO veto may be taken to the AODR. Ensure approved procedures are used for sanitizing and releasing system components and media as necessary. Ensure proper measures are taken when cyber security incident or vulnerability is discovered. Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures. Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs).Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance. Manage, maintain, and execute the information security continuous monitoring plan. Ensure a record is maintained of all security-related vulnerabilities and ensure serious or unresolved violations are reported to the AODR; and assess changes to the system, its environment, and operational needs that could affect the security authorization. Other related tasks as assigned. Support information technology (IT) security goals and objectives and reduce overall organizational risk; Advise senior management (e.g., Chief Information Security Officer [CISO] and Chief Information Officer [CIO] on risk levels and security posture.); Advise appropriate senior leadership of changes affecting the organization's cybersecurity posture; Communicate the value of information technology (IT) security. Knowledge, Skills, and Abilities: Highly organized individual with exceptional communication skills, ensuring all stakeholders are consistently informed and updated as required. Excellent written and oral communication skills (writing samples may be requested). Attention-to-detail is critical, proven ability to look closely at your work to identify and correct errors, spot and improve weaknesses and produce a near-perfect end-result. Ability to identify problems, brainstorm and analyze answers, and implement the best solutions. Ability to develop and review security related procedures or processes and reports. Demonstrated ability to provide clear, precise, and factual information to senior leaders, team members, and external stakeholders. Capable of attending all customer-required meetings and promptly providing responses as requested. Familiarity with applicable regulations affecting Cyber Security NIST 800 Series Standards. Clearance: Must possess (or be able to obtain) a “Q” level security clearance. Education: A bachelor's degree in information technology systems, computer science, or related field and experience in information technology systems or related area. Relevant experience may be substituted for education on a year-for-year basis. Experience: 7+ years in IT security or related field. Authority to Operate Life Cycle (ATO), Risk Management, POAMS & Milestones Certification: Highly desired certifications: Certified Information System Security Professional (CISSP) Certified Information Security Manager (CISM) Benefits Covers 100% of employee benefit premiums, including Medical (PPO or HDHP Option), Vision, Dental Matching 401K Short- and Long-Term Disability Pet Insurance Professional Development/Education Reimbursement Parking and Transit Benefits for NY, NJ, ATL, and DC Metro areas Other Duties: Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
    $75k-102k yearly est. 1d ago
  • Security Analyst

    Intersources Inc.

    Cyber security analyst job in Columbia, SC

    Title: Security Analyst - Project Lead (8780) Work Mode: Hybrid (3 days onsite per week required) Contract Duration: 12 months (Extension possible) Interview Process: 1 round, virtual video interview required Candidate Requirement: Candidate must be a current South Carolina resident. No relocation allowed. Scope of Work The resource will plan, coordinate, evaluate, document, and report on IRS Pub 1075 compliance activities, including security controls, corrective action plans (CAPs), artifacts, SCSEM requirements, and follow-up remediation. Key Responsibilities • Lead, coordinate, and support preparation efforts for an IRS Safeguard Review. • Review Corrective Action Plans (CAPs) for effectiveness and determine compliance readiness. • Review SSR, SSPs, and SSAs to ensure alignment with IRS Publication 1075. • Identify relevant IRS Safeguard Computer Security Evaluation Matrix (SCSEM) controls and assess agency compliance. • Provide technical advice for remediation of non-compliant SCSEM control areas. • Assist and coordinate follow-up actions after the Safeguard Review, including CAP development for findings. • Provide expert analysis of proposed technical solutions to ensure compliance with IRS Pub 1075. • Conduct research and recommend security improvements for systems and infrastructure. • Use the agency's established project management methods for planning, coordination, communication, and reporting. • Communicate effectively with both technical and non-technical staff, including federal and state stakeholders and executive leadership. Required Skills (Must Have) • 5+ years of expert-level experience as a Security Analyst, including risk assessment, vulnerability management, and incident response. • 3+ years of experience preparing for and actively supporting at least one IRS Safeguard Review at a state agency. • 3+ years of experience working with and applying IRS SCSEM requirements including implementation, compliance assessment, and documentation. • 3+ years of experience with IRS Publication 1075 (Rev. 11-2021) compliance. • Strong proficiency with Microsoft Office, SharePoint, and Microsoft Teams. • Excellent oral and written communication skills across multidisciplinary teams. • Knowledge of applicable IT security standards (e.g., ISO, IEEE). Preferred Skills • Experience with Child Support Enforcement systems or knowledge of Child Support program operations and objectives. • Experience with federal or state regulatory compliance frameworks such as FISMA, NIST, or IRS Publication 1075. • Experience developing and maintaining technical documentation and audit support for safeguard reviews, security audits, and compliance assessments.
    $55k-76k yearly est. 1d ago
  • Cyber Security Analyst - GRC Support

    Savannah River National Laboratory 4.5company rating

    Cyber security analyst job in Aiken, SC

    Savannah River National Laboratory (SRNL) is seeking an energetic individual with good interpersonal skills to join the Cyber Assurance, Governance, Risk Management and Compliance team! The selected individual will assist the Information Systems Security Officer (ISSO) and GRC team with NIST Risk Management Framework (RMF) processes to ensure a secure operational security posture is in place and maintained throughout the lifecycle of the system and/or network. Minimum Qualifications: Bachelor's degree in Computer Science, Information Assurance, or related field 4-6 years of relevant experience in NIST Risk Management Framework and Control Sets (i.e., NIST 800-37 and NIST 800-53) as a federal-contractor employee For ability to obtain and maintain a security clearance, US Citizenship is Legally Required Preferred Qualifications: Working knowledge and experience with the NIST Risk Management Framework and Control Sets (i.e., NIST 800-37 and NIST 800-53) in a federal contractor role Attention to detail and strong written communication skills (clear, concise for evidence/control implementation descriptions) Experience with information assurance tools (GRC, Tenable.SC, Nessus, Splunk, etc.) Ability to quickly learn new technologies, concepts, and processes Demonstrated ability to work collaboratively in a team environment with good interpersonal skills Active DOE L clearance Data entry, updates and maintenance of System Security Plans and other documents/evidence in the GRC tool Executing scans security scans (compliance and vulnerability related) Tracking status of temporary risk findings to closure and gathering remediation evidence Pulling configuration compliance reports, STIG checklists, CIS benchmarks Assist with RMF Continuous Monitoring activities and new project Risk Assessments Assist Project Security Officers and ISSOs with preparation of authorization packages for new projects and accreditation boundary Assist with entry of new risks, updates or maintenance in the risk register Assist in performing security impact analysis using approved security policies and SSPs and provide recommendations for meeting requirements with adequate security controls that align with business objectives. Work effectively in a team environment to resolve issues and contribute to continuous process improvement efforts. Participate/assist with compliance assessments/audits and data calls. Interact with customers and peers in a professional and responsive manner.
    $59k-83k yearly est. Auto-Apply 2d ago
  • Senior Cyber Security Analyst - (ISSM)

    Delaware Nation Industries

    Cyber security analyst job in Aiken, SC

    DNI is on the lookout for a Senior Cyber Security Analyst - Information Systems Security Manager (ISSM) to deliver expert guidance in Information Systems Security and cybersecurity support for the Enterprise Information Services at the Department of Energy (DOE) Savannah River Operations Office (DOE-SR), located at the Savannah River Site (SRS) in Aiken, SC. Requirements Reports to the Chief Information Security Officer (CISO) and Program Manager. Oversee the Authority to Operate (ATO) lifecycle, manage risk assessments, develop and monitor Plan of Action and Milestones (POAMs), ensuring compliance with security standards and timely mitigation of organizational boundary security risks. Actively participate in the bi-weekly accreditation boundary meetings and keep the AODR informed of any changes/updates to eRAMS/POA&Ms/STAR items or any new VPM and CM issues that may arise. Provide technical and procedural cyber security advice to DOE, associate contractor partners, and Industrial Control Systems (ICS) teams as necessary. Oversee operational information systems security implementation programs. Coordinate with Information System Security Officer (ISSO) or PSO on approval of External Information Systems (e.g. guest systems, interconnected system with another organization). Oversee ISSOs to ensure they follow established policies and procedures and timelines. Ensure CM policies and procedures for authorizing the use of hardware/software on an IT system are followed. Any additions, changes or modifications to hardware, software, or firmware must be coordinated with the AODR prior to the addition, change or modification. ISSM shall have authority to veto any proposed change they feel is detrimental to security in boundaries under their purview. Appeals on an ISSM/ISSO veto may be taken to the AODR. Ensure approved procedures are used for sanitizing and releasing system components and media as necessary. Ensure proper measures are taken when cyber security incident or vulnerability is discovered. Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures. Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs).Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance. Manage, maintain, and execute the information security continuous monitoring plan. Ensure a record is maintained of all security-related vulnerabilities and ensure serious or unresolved violations are reported to the AODR; and assess changes to the system, its environment, and operational needs that could affect the security authorization. Other related tasks as assigned. Support information technology (IT) security goals and objectives and reduce overall organizational risk; Advise senior management (e.g., Chief Information Security Officer [CISO] and Chief Information Officer [CIO] on risk levels and security posture.); Advise appropriate senior leadership of changes affecting the organization's cybersecurity posture; Communicate the value of information technology (IT) security. Knowledge, Skills, and Abilities: Highly organized individual with exceptional communication skills, ensuring all stakeholders are consistently informed and updated as required. Excellent written and oral communication skills (writing samples may be requested). Attention-to-detail is critical, proven ability to look closely at your work to identify and correct errors, spot and improve weaknesses and produce a near-perfect end-result. Ability to identify problems, brainstorm and analyze answers, and implement the best solutions. Ability to develop and review security related procedures or processes and reports. Demonstrated ability to provide clear, precise, and factual information to senior leaders, team members, and external stakeholders. Capable of attending all customer-required meetings and promptly providing responses as requested. Familiarity with applicable regulations affecting Cyber Security NIST 800 Series Standards. Clearance: Must possess (or be able to obtain) a “Q” level security clearance. Education: A bachelor's degree in information technology systems, computer science, or related field and experience in information technology systems or related area. Relevant experience may be substituted for education on a year-for-year basis. Experience: 7+ years in IT security or related field. Authority to Operate Life Cycle (ATO), Risk Management, POAMS & Milestones Certification: Highly desired certifications: Certified Information System Security Professional (CISSP) Certified Information Security Manager (CISM) Benefits Covers 100% of employee benefit premiums, including Medical (PPO or HDHP Option), Vision, Dental Matching 401K Short- and Long-Term Disability Pet Insurance Professional Development/Education Reimbursement Parking and Transit Benefits for NY, NJ, ATL, and DC Metro areas Other Duties: Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
    $72k-97k yearly est. 17d ago
  • Product Security Engineer, AI

    Meta 4.8company rating

    Cyber security analyst job in Columbia, SC

    Meta's Product Security team is seeking a experienced hacker who derives purpose in life by revealing potential weaknesses and then crafting creative solutions to eliminate those weaknesses. Your skills will be the foundation of security initiatives that protect the security and privacy of over two billion people. You will be relied upon to provide engineering and product teams with the web, mobile, or native code security expertise necessary to make informed product decisions. Come help us make life hard for the bad guys. **Required Skills:** Product Security Engineer, AI Responsibilities: 1. Security Reviews: perform manual design and implementation reviews of products and services that make up the Meta ecosystem, like Instagram, WhatsApp, Oculus, Portal, and more 2. Developer Guidance: provide guidance and education to developers that help prevent the authoring of vulnerabilities 3. Automated Analysis and Secure Frameworks: build automation (static and dynamic analysis) and frameworks with software engineers that enable Meta to scale consistently across all of our products **Minimum Qualifications:** Minimum Qualifications: 4. BS or MS in Computer Science or a related field, or equivalent experience 5. 8+ years of experience finding vulnerabilities in interpreted languages. Knowledge of best practice secure code development 6. Experience with exploiting common security vulnerabilities 7. Knowledge of common exploit mitigations and how they work 8. Coding and scripting experience in one or more general purpose languages **Preferred Qualifications:** Preferred Qualifications: 9. Experience creating software that enables security processes, especially those leveraging AI/ML for automation or augmentation 10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling 11. Experience creating software that enables security processes 12. 8+ years of experience finding vulnerabilities in C/C++ code 13. Contributions to the security community (public research, blogging, presentations, bug bounty) 14. Demonstrated ability to collaborate with AI researchers or engineers to apply AI in security workflows **Public Compensation:** $177,000/year to $251,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $177k-251k yearly 60d+ ago
  • Senior Analyst, Security Compliance (SOX IT)

    Coinbase 4.2company rating

    Cyber security analyst job in Columbia, SC

    Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system. To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems. Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be. While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported. Coinbase stores more digital currency than any company in the world, making us a top tier target on the internet. Security is core to our mission and has been a key competitive differentiator for us as we scale worldwide. Essential to scaling is building and running a security compliance program that reflects how we protect the data and assets in our care, to open the doors with customers, regulators, auditors, and other external stakeholders. If you love working with fast moving companies to grow and scale security compliance engines and create positive change across the business, we'd like to speak with you about joining our team. Coinbase is looking for a Security Compliance Senior Analyst to drive the second line of defense IT SOX initiatives and help mature the IT SOX program. *What you'll be doing (ie. job duties):* * Lead Security and IT initiatives to support the SOX roadmap and advance program maturity * Assist with SOX planning activities, including scoping of IT systems and creating training material to owners in preparation for SOX audit * Lead security control gap assessments over SOX control environment, recommend remediation plans and track through completion * Assess SOX implications of new products, update relevant controls, and communicate requirements to product organization and other stakeholders * Provide ongoing reporting to stakeholders and leadership on above responsibilities and communicate progress and escalations management * Perform SOX audit and control impact analysis as a result of security and technology incidents and partner with owning teams on control uplift activities * Build close relationships with stakeholder teams including Security, IT, Infrastructure, Engineering, Data, and Finance to advise on SOX requirements and ensure excellence in control ownership * Create and improve SOX procedural documentation, including process documentation, data flow diagrams, and uplifting templates * Work closely with internal and external auditors to educate them about a complex technology control environment * Oversee quality of audit initiatives, identify and analyze process gaps, provide guidance and expertise to team members * Develop creative solutions to prove risk mitigation and solve for complex audit problems faced by the crypto industry * Identify opportunities to address systemic program challenges, recommend solutions and drive efficiency through AI and automation *What we look for in you (ie. job requirements):* * Minimum of 5+ years of security/IT compliance or equivalent experience * Strong knowledge and hands-on experience in Internal Controls over Financial Reporting, SOX 404 frameworks, and testing to support compliance * Prior experience at a big 4 accounting firm * Experience leading compliance initiatives from start to finish * Proven understanding and audit experience of cloud technologies, AWS preferred * Ability to effectively and autonomously accomplish outcomes across cross-functional teams in ambiguous situations with minimal supervision * Strong oral and written communication skills * Ability to multitask, direct cross functional work, and hold others accountable to committed deadlines in a fast paced environment * Ability to communicate with technical / non-technical stakeholders to align on shared outcomes * Experience in Financial services, Big Tech, or FinTech *Nice to haves:* * BA or BS in a technical field or equivalent experience * Security certifications e.g. CISA, CISSP, CISM or other relevant certifications * Experience auditing in Crypto space Position ID: P73675 \#LI-Remote *Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)). Pay Range: $167,280-$196,800 USD Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying. Commitment to Equal Opportunity Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law. Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations*********************************** *Global Data Privacy Notice for Job Candidates and Applicants* Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required. *AI Disclosure* For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description. For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate. *The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
    $167.3k-196.8k yearly 59d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Columbia, SC

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills. **Responsibilities:** + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Experience with scripting languages (e.g., PowerShell, Python) for automation and integration. + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Understanding of DevOps practices. + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. + Adaptability to stay ahead of evolving IAM technologies and security threats. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 29d ago
  • IS Security Analyst

    Palmetto GBA 4.5company rating

    Cyber security analyst job in Columbia, SC

    Researches, analyzes and troubleshoots information systems compliance and security issues. Identifies, validates and reports on security incidents and events based on enterprise policies and procedures. Performs forensic information security investigations involving enterprise computers, servers and/or networking infrastructure. Assists in providing security infrastructure and support for enterprise systems. Description Logistics: BlueCross BlueShield of South Carolina Location: This hybrid position is full-time (40-hours/week) Monday-Friday in a typical office environment. You will work an 8-hour shift scheduled during our normal business hours of 8:00AM-5:00PM with rotational on-call duties. It may be necessary, given the business need to work occasional overtime. This role is located at 2501 Faraway Drive, Columbia, SC 29223. Government Clearance: This position requires the ability to obtain a security clearance, which requires applicants to be a U.S. Citizen. Sponsorship: This position is not eligible for sponsorship now or in the future. Position Purpose: Researches, analyzes and troubleshoots information systems compliance and security issues. Identifies, validates and reports on security incidents and events based on enterprise policies and procedures. Performs forensic information security investigations involving enterprise computers, servers and/or networking infrastructure. Assists in providing security infrastructure and support for enterprise systems. What You'll Do: Responsible for analyzing compliance and technical control validation data to determine and report baseline variance for all applicable technology environments. Interfaces with internal and external audit staff to ensure appropriate and accurate responses to audit queries are satisfied in a timely fashion. Assists in researching and evaluating systems and procedures for the prevention, detection, containment and correction of information security breaches. Assists in advising management and users regarding security procedures and compliance policies. Utilizing technologically advanced software, performs system monitoring evaluations and audits to ensure compliance with the corporate security policies and standards. Prepares and analyzes compliance information to develop mitigation priorities, milestones and audit responses. Participates in the evaluation of products and/or procedures to enhance productivity and effectiveness of information security across the organization. Assists architects and security specialists to ensure adequate security solutions are in place throughout IT systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements. Work Environment: Fast paced, multi-platformed environment which may require action and response 24X7 to support the technical business needs of the customer. To Qualify, You'll Need: Required Education: Bachelor's degree in a job-related field Degree Equivalency: 8 total years of job-related work experience OR Associate's degree in a job-related field plus 2 additional years of job-related work experience for a total of 6 years of job-related work experience. Required Experience: 4 years of job-related technical experience. Required Skills and Abilities: Strong data analysis and correlation abilities. Strong organizational, interpersonal and communication skills. Strong knowledge of administrative, procedural and technical controls used to reduce security risks. Ability to effectively prioritize and execute tasks in a high-pressure environment. Strong knowledge of enterprise data architecture, systems engineering and data communications as applied to the automated storage and retrieval of information, using multiple platforms and protocols with the inherent security risks of each. Strong understanding of the organization's goals and objectives. Strong familiarity with threat analysis risk management, configuration management, business continuity and contingency planning as it applies to IT. Ability to troubleshoot multi-vendor Security issues. Able to work in a team-oriented, collaborative environment. Excellent attention to detail. Required Software and Tools: Strong proficiency with applicable IT Security tools (software and hardware). Microsoft Office. We Prefer that You Have: Preferred Work Experience: Experience in network security (Cisco ASA, IPS, VPN, RSA SecurID, PKI, cryptography), security controls for LAN/WANs, client server, web-based systems, and databases. Experience with configuration of security devices such as firewalls, intrusion prevention, patch deployment, and risk assessment/ vulnerability scanners. Level 1 SOC Experience Preferred Software Tools: Intrusion Detection/Prevention systems SIEM Monitoring tools Endpoint Detection and Response software Forensics Analysis tools Tennable Nessus scanning software Preferred Licenses and Certificates: CompTIA Security +, OSCP, GIAC (GSEC, GCIH), CISA, NSA, CISM, CISSP What we Can Do for You: Our comprehensive benefits package includes: 401(k) retirement savings plan with company match Subsidized health plans and free vision coverage Life insurance Paid annual leave - the longer you work here, the more you earn. Nine paid holidays On-site cafeterias and fitness centers in major locations Wellness programs and a healthy lifestyle premium discount Tuition assistance Service recognition What to Expect Next: After submitting your application, our recruiting team members will review your resume to ensure you meet the qualifications. This may include a brief telephone interview or email communication with our recruiter to verify resume specifics and salary requirements. Management will be conducting interviews with those candidates who qualify with prioritization given to those candidates who demonstrate the preferred qualifications. Equal Employment Opportunity Statement BlueCross BlueShield of South Carolina and our subsidiary companies maintain a continuing policy of nondiscrimination in employment to promote employment opportunities for persons regardless of age, race, color, national origin, sex, religion, veteran status, disability, weight, sexual orientation, gender identity, genetic information or any other legally protected status. Additionally, as a federal contractor, the company maintains affirmative action programs to promote employment opportunities for individuals with disabilities and protected veterans. It is our policy to provide equal opportunities in all phases of the employment process and to comply with applicable federal, state and local laws and regulations. We are committed to working with and providing reasonable accommodations to individuals with disabilities, pregnant individuals, individuals with pregnancy-related conditions, and individuals needing accommodations for sincerely held religious beliefs, provided that those accommodations do not impose an undue hardship on the Company. If you need special assistance or an accommodation while seeking employment, please email ************************ or call ************, ext. 47480 with the nature of your request. We will make a determination regarding your request for reasonable accommodation on a case-by-case basis. We participate in E-Verify and comply with the Pay Transparency Nondiscrimination Provision. We are an Equal Opportunity Employer. Here's more information. Some states have required notifications. Here's more information.
    $58k-84k yearly est. Auto-Apply 11d ago
  • Security Analyst - Consultant

    Execrecruitment

    Cyber security analyst job in Blythewood, SC

    Job Title: Security Analyst - Consultant Scope of the project: Enhance the security posture of the Department of Motor Vehicles to protect sensitive citizen data and ensure the integrity of motor vehicle licensing and titling systems. Key duties and Responsibilities Champion DevSecOps through Security Automation: Leverage your full-stack development expertise to design, implement, and maintain security tools and automation. This includes building scripts to automate critical tasks like data security checks, vulnerability scanning, and user access control, streamlining security processes and improving overall efficiency. Monitor and analyze security events: You'll be responsible for monitoring security information and event management (SIEM) tools to identify potential threats and suspicious activity. Along with determine security gaps in these controls to improve overall security posture. This will also involve analyzing logs, investigating alerts, and using your knowledge of security frameworks (NIST, CIS, CISA) to assess risk. Support secure application development: You'll collaborate with developers to ensure secure coding practices are followed throughout the Software Development Lifecycle (SDLC). This might involve code reviews, threat modeling, and providing guidance on secure development principles. Investigate and respond to security incidents: In the event of a security breach, you'll be part of the incident response team, helping to identify the root cause, mitigate damage, and implement recovery procedures. Document security procedures and best practices: You'll develop clear and concise documentation for security policies, procedures, and best practices. This may involve creating training materials or user guides to ensure everyone understands their role in maintaining security. Provide on-call support when needed and other related duties as required. Required Skills (rank in order of importance): Exceptional communication and interpersonal skills, with a proven ability to deliver exceptional customer service through training and documentation. 5 years of Expert level experience with C#, Python, Powershell, or Rust (is a plus) Understanding of secure by design principles. 1 year of Understanding of automation principles, including the use of AI, ML, and scripting, to streamline security tasks 3 years of Understanding of the Software Development Lifecycle (SDLC) and DevSecOps principles to integrate security considerations throughout the application development process. 3 years of Proficiency in CLOUD SECURITY principles, including identity and access management, data security, and compliance. Education Requirement A bachelor's degree in information technology systems, computer science, cybersecurity, or a related field. Relevant experience may be substituted for the degree on a year-for-year basis Preferred Skills 1 Year of Experience with SIEM (Security Information and Event Management) tools, including configuration, tuning, threat hunting, and alert creation. 1 Year of In-depth knowledge of security frameworks, including NIST, CIS, and CISA, and their application in a hybrid environment. Solid understanding of incident response processes and experience in implementing them effectively. Advanced understanding of security controls, including their configuration and implementation in hybrid environments. 1 Year of Expertise in data classification and DLP (Data Loss Prevention) configuration to safeguard sensitive information. Preferred Certifications: Not required, however we prioritize applicants who have: Certified Incident Handler (GCIH) Certified Computer Security Incident Handler (CSIH) EC-Council Certified Incident Handler (ECIH) EC-Council Certified Network Defender (CND) GIAC Critical Infrastructure Protection (GCIP) GIAC Defensible Security Architecture (GDSA) Benefits at IntelliBee Long-Term Stability: Join us on a multi-year opportunities with room to grow. Comprehensive Health Coverage: Access quality healthcare benefits to keep you and your family well. Future Planning: Enroll in our 401(k) program and invest in your financial security. GC Assistance: We support immediate Green Card processing, if required. Please apply on our secured job site at <> or email [email protected]
    $55k-76k yearly est. Auto-Apply 60d+ ago
  • Security Analyst

    Msysinc

    Cyber security analyst job in Columbia, SC

    REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE): 6 years information security experience Excellent written skills; Proven work experience in process improvement Ability to identify processes that must be in place for an IT organization to be efficient Extensive knowledge of IRS Pub 1075, NIST 800-53, ITIL, and CJIS Process Management ITIL Business Analysis experience to include data flow diagrams, requirements specifications, use case scenarios, and acceptance testing. Ability to work with security technicians to develop detailed procedures; Ability to quickly grasp complex technical concepts and make them easily understandable in both text and diagrams/flow charts Ability to deliver high quality documentation with attention to detail. REQUIRED EDUCATION: Bachelor's Degree in a relevant field of work or equivalent work experience. Additional Information All your information will be kept confidential according to EEO guidelines.
    $55k-76k yearly est. 11h ago
  • Security Analyst

    Ask It Consulting

    Cyber security analyst job in Columbia, SC

    Security Analyst Duration : 12+ Months REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE): Ability to install and use various security tools Application Security Experience in projects involving PCI/NIST security implementations and/or audits information security principles and practices IRS Safeguard Computer Security Evaluation Matrix (SCSEM) IT Security Malware NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY CONTROLS risk/vulnerability assessments Security - Knowledge in networking, databases, systems and Web operations SSP Additional Information All your information will be kept confidential according to EEO guidelines.
    $55k-76k yearly est. 60d+ ago
  • Senior Security Engineer

    Zentek Infosoft 4.2company rating

    Cyber security analyst job in Columbia, SC

    Zentek is a national recruiting company which partners with many of the leading employers in the Life Sciences, IT, and Financial Services sectors, feel free to check us out at ********************** Job Description Hi, Hope you are doing well!! My name is Ashita, resource professional with Zentek, Inc. Below are some key highlights of a contract position. If this is of interest please let me know. I would be happy to arrange a time to discuss the details and/or to further determine which types of opportunities you may be interested in exploring. Also help me out with your contact details. Job Title : Senior Security Engineer Location : South Carolina Duration : 3 months Contract to hire Role Description "The candidate will be responsible for: • Working directly with a broad range of security tools to implement changes and features • Developing strategies to improve operational workflow • Designing systems architectures and deployment strategies • Provide recommendations to overall system deployment and design • Providing expertise to members of the team and the customer • Gather detailed requirements necessary to develop a compliant solution to meet the client needs • Make recommendations for solutions needed to meet client demands Preferred Project or Engagement Background "The candidate will have the following attributes: • Expert in Linux System Administration • Expert in a broad range of security tools, Firewalls, NIDS, HIDS, SIEM, Endpoint protection. • Experience as a consultant, security engineer, similar responsibilities • Significant experience in security architecture and design techniques • Knowledge in compliance assessment and solutions for regimes such as PCI, HIPAA, SOX, etc • Knowledge of data center, cloud based environments, or Security Operations Center (SOC) • Knowledge of SOC workflow, and use of technology to replace manual labor • Have relevant industry IT security certifications • Knowledge and experience in Project Management, including related techniques and tools • Ability to interpret customer requirements and develop solutions to meet these requirements • Proven experience in writing statements of work and / or proposals in response to client requirements • Excellent communication and presentation skills • Ability to work closely with C Level executives in large enterprises • Commitment to excellence and willingness to do what is necessary to get the job done • Ability to travel in support of meetings, presentations, conferences, and similar events • Able to develop and deliver solutions, and thrive in a fast paced “start up” like environment Qualifications Required Skills: · security architecture and design · firewall · HIDS/NIDS · Linux · Scripting · SOC Workflow · network security · endpoint protection solutions Additional Information All your information will be kept confidential according to EEO guidelines.
    $89k-119k yearly est. 60d+ ago
  • Security Engineer II

    Trustmark 4.6company rating

    Cyber security analyst job in Columbia, SC

    Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities. We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information. You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs. **Responsibilities:** + Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data. + Conduct vulnerability assessments and penetration testing to identify and mitigate risks. + Develop and implement security policies, standards, and procedures. + Monitor security systems and respond to incidents promptly and effectively. + Stay up-to-date with the latest cybersecurity threats and trends. + Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business. + Provide technical guidance and support to internal stakeholders. **Qualifications:** + Bachelor's degree in Computer Science, Information Technology, or a related field or + 3-5 Years of network engineering or cyber engineering experience + Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001). + Proficiency in network security, systems security, application security, and data security. + Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM). + Excellent problem-solving and analytical skills. + Strong communication and interpersonal skills. + Ability to work independently and as part of a team. **Preferred Qualifications:** + Certifications such as CISSP, CISA, or CEH. + Experience with cloud security (e.g., AWS, Azure, GCP). + Knowledge of scripting and programming languages (e.g., Python, PowerShell). Brand: Trustmark Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums. **For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability. Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match. When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives. At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
    $74k-95k yearly est. 60d+ ago
  • Cyber Security Analyst - Cyber Policy

    Savannah River National Laboratory 4.5company rating

    Cyber security analyst job in Aiken, SC

    Savannah River National Laboratory (SRNL) is seeking an experienced cyber security policy professional to join the Cyber Assurance, Governance, Risk Management and Compliance team! The selected individual will serve as lead policy writer and subject-matter expert for the DOE-SRNL cybersecurity program. Minimum Qualifications Bachelor's degree in Cybersecurity, Information Management/Assurance, or related field 6 to 9 years of experience in Cybersecurity and Policy in a federal-contractor position Excellent and proven writing skills in the cybersecurity field that show the ability to be clear and concise for complex topics. Samples provided may be redacted if needed. For ability to obtain and maintain a security clearance, US Citizenship is Legally Required. Preferred Qualifications Expert knowledge of DOE 205.1x and Cyber Security Program Plans Current or recent experience supporting DOE policies related to cybersecurity Good interpersonal skills and demonstrated ability to work collaboratively in a team environment Certifications in Cyber such as CISSP, CISM, CGRC (formerly ISC2 CAP), or CRISC. Policy-focused certifications (GIAC-GLEG, GSLC or similar) Strong attention to detail Ability to learn new technologies, concepts, and processes quickly Active DOE L clearance Serve as principal author for all new and revised SRNL specific cybersecurity policies and procedures Develop and maintain responses to contracts for DOE Orders and Cyber Security Program Plan Review and advise as to impact to cybersecurity approved policies for other SRNL procedures with cybersecurity references Assist ISSOs with creating and maintaining supplemental program documents, policies and procedures for multiple accreditation boundaries based on approved security controls Perform gap analysis for draft, new, or updated federal mandates (EO 14028, BODS, OMB Memos) and write comprehensive summaries that support efficient decision making where needed Support audits and assessments with policy evidence artifact/packages Review cybersecurity training and develop newly identified training, keeping aligned with approved policies Review and advise ISSOs additional documents such as Risk Assessments, Security Impact Analysis or others as requested. Work effectively in a team environment and contribute to continuous process improvement efforts. Participate/assist with compliance assessments/audits and data calls. Interact with customers and peers in a professional and responsive manner.
    $59k-83k yearly est. Auto-Apply 1d ago
  • Security Engineer

    Meta 4.8company rating

    Cyber security analyst job in Columbia, SC

    Meta Platforms, Inc. (Meta), formerly known as Facebook Inc., builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps and services like Messenger, Instagram, and WhatsApp further empowered billions around the world. Now, Meta is moving beyond 2D screens toward immersive experiences like augmented and virtual reality to help build the next evolution in social technology. To apply, click "Apply to Job" online on this web page. **Required Skills:** Security Engineer Responsibilities: 1. Build tools that enable connectivity to our infrastructure only from Meta owned and managed devices. 2. Build machine attestation and secure certificate storage solutions to enable strong client trust. 3. Deploy systems that help mitigate security risks by understanding and controlling what software is allowed to execute on our client devices. 4. Develop, validate, and enforce our client security policies. 5. Build and deploy tools and automation that proactively detect and respond to security risks and threats to internal corporate services. 6. Advise and collaborate with other teams. 7. Telecommuting from anywhere in the U.S. allowed. **Minimum Qualifications:** Minimum Qualifications: 8. Requires Bachelor's Degree (or foreign equivalent) in Computer Science, Engineering or a related field and 1 year of experience in the job offered or a computer-related occupation 9. Requires 12 months of experience involving the following: 10. PHP, Golang, Python, C/C++, Rush, or Ruby 11. Designing and deploying security infrastructure such as PKI, key management, and certificate management 12. Endpoint Security & Management 13. Certificate Lifecycle 14. Devices & OS hardening and security policies 15. Identity & Access Management (Authentication & Authorization, SSO) 16. Network Security and 17. Programming and Code Review **Public Compensation:** $178,041/year to $200,200/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $178k-200.2k yearly 35d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Columbia, SC

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 29d ago
  • Offensive Security Engineer, Assessments (Web3)

    Coinbase 4.2company rating

    Cyber security analyst job in Columbia, SC

    Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system. To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems. Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be. While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported. The Application Security organization at Coinbase is seeking to hire an experienced Offensive Security Engineer specializing in Web3 penetration testing and Web3 bug bounty program management and optimization. In this role, you will collaborate with the Bug Bounty Program Lead to drive Web3 bug bounty triage, validation, and strategic initiatives aimed at increasing program efficiency, maturity, and hacker engagement. You will work closely with whitehat hackers, security engineers, and cross-functional teams to enhance Coinbase's security posture through an effective bug bounty program. Additionally, you will perform penetration tests on Web3 technologies and applications, ensuring the security of Coinbase's blockchain-based products and services. *What you'll be doing (ie. job duties):* * Conduct security assessments of Web3 products and services, including smart contracts, DeFi protocols, and blockchain infrastructure. * Collaborate with partner teams to enhance detection and response capabilities for Web3 vulnerabilities. * Stay informed on emerging security trends, advisories, and academic research in the Web3 space. * Lead Web3 bug bounty triage and validation, ensuring timely and accurate assessments of reported vulnerabilities. * Develop and implement strategies to incentivize high-quality bug bounty submissions and engage with the hacker community. * Manage the Web3 bug bounty program, including scope updates, researcher communication, and payout disbursements. * Analyze bug bounty data to identify trends, common vulnerabilities, and areas for improvement. * Collaborate with engineering teams to prioritize and remediate vulnerabilities identified through the bug bounty program. * Mentor and train junior security engineers in Web3 bug bounty triage and analysis. * Provide on-call support for critical Web3 bug bounty-related incidents. * Document and report on Web3 bug bounty metrics and program effectiveness. *What we look for in you (ie. job requirements):* * Bachelor's or Master's degree in Computer Science, Cybersecurity, Software Engineering, or a related field. * 3+ years of experience in Web3 application security and penetration testing. * Proven track record of identifying critical vulnerabilities across the blockchain protocol stack, Web2, and Web3 components. * Extensive knowledge of the blockchain ecosystem, including L1/L2 networks, DeFi protocols, and staking mechanisms. * Deep understanding of Web2 security concepts and common vulnerabilities (e.g., OWASP Top 10, SANS Top 25). * Strong analytical skills to identify trends and patterns in vulnerabilities. * Excellent communication skills for engaging with internal teams. * Passion for security and a drive to improve Web3 security posture. * Ability to work independently and take ownership of penetration testing initiatives. * Energy and self-drive for continuous learning in the rapidly evolving crypto space. * Excellence in clear, direct, and kind communication with technical and non-technical stakeholders. * Experience building relationships with product, engineering, and security teams. *Nice to haves:* * Participation in CTFs, bug bounty programs, or open-source security research. * Expertise in Application Security, Network Security, or Cloud Security. * Relevant security certifications (e.g., OSCP, GPEN). * Experience developing and implementing security tooling to support bug bounty triage and analysis. * Experience with bug bounty programs and platforms, including triage, validation, and researcher communication. * Strong analytical skills to identify trends and patterns in bug bounty submissions. * Excellent communication skills to effectively engage with bug bounty researchers. Position ID: P69494 \#LI-remote *Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)). Pay Range: $152,405-$179,300 USD Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying. Commitment to Equal Opportunity Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law. Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations*********************************** *Global Data Privacy Notice for Job Candidates and Applicants* Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required. *AI Disclosure* For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description. For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate. *The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
    $152.4k-179.3k yearly 60d+ ago
  • Security Analyst

    Ask It Consulting

    Cyber security analyst job in Columbia, SC

    ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations. We have openings for Security Analyst for one of our client in Columbia, SC. Job Description Position: Security Analyst Location: Columbia, SC 29210 Duration: 12 Months Position Description: Previous experience as a principle level object oriented developer with in depth knowledge of software development security principles. In depth knowledge of the Windows kernel and developing Windows based device drivers. You will assist in the design, develop, and implementation of systems security for our existing production systems (Primarily Windows Based). Requirements: • Bachelor's degree in computer science or related discipline, Master's degree preferred. • 5+ years of professional software development experience. More is better. • Strong knowledge and skills in Windows databases, optimizing queries, SQL Injection attacks, OWASP Top 10 remediation techniques, and ensuring sensitive data is secure in use, transit and at rest. • Strong knowledge and skills in Windows internals, debugging and reverse engineering. • Strong knowledge of Windows Security such as Token / Privileges /SID /ACLs /Group Policy /Active Directory. • Demonstrated ability to design software and systems solutions, securely. • Ability to work collaboratively in a small close-knit team and have good communication skills. • Security expertise. Experience building secure code, penetration testing, and reverse engineering malware. • Experience with Windbg, ollydbg, metaspolit, wireshark, burp suite, and other security tools. • MS Visual Studio, XML, XHTML, ASP.NET, C++, J#, etc. • Experience building and securing Enterprise software products. • Have worked in an Agile development environment with Scrum. • Solid understanding of industry best practices for securing systems, secure systems design, security testing, and implementation. Skills: • Software development Reverse Engineering • Application Security • burp suite • information security principles and practices • Malware • metaspolit • ollydbg Yes • optimizing queries • OWASP Top 10 remediation techniques • Penetration Testing • Security - Knowledge in networking, databases, systems and Web operations • Security Information Architecture • SQL Injection attacks • Windbg • Windows - SID • Windows Security - Privileges • Windows Security - Token • Windows Security - ACL • Windows Security - Group Policy • wireshark • IT Security • Active Directory • Information SecuritySecurity Program evaluation • Experience with UNIX, Windows, Linux, MacOS, Cisco, Juniper, web apps, databases, strong authentication, operating systems and network security protocols and procedures. • Network security • Windows • Agile/Scrum Methodology • C/C++ • J# • Visual Studio • XHTML • XML Additional Information Ask IT Consulting Inc.| 33 Peachtree St., Suite 100 |Holtsville, NY 11742 Website: **********************
    $55k-76k yearly est. 60d+ ago
  • Cyber Security Analyst, Intermediate

    Savannah River National Laboratory 4.5company rating

    Cyber security analyst job in Aiken, SC

    Savannah River National Laboratory (SRNL) is seeking a Cyber Security Analyst to join the Cyber Engineering team! The selected individual will work with other team members to ensure robust security controls are selected, implemented, and maintained for a NIST RMF accredited boundaries within unclassified environments. Minimum Qualifications: Bachelor's degree in relevant field of study and 4-6 years of work experience At least 1 general cybersecurity certification and 1 technical certification Technical skills include: understanding security architectures, encryption, firewalls, IDS/IPS, Network security protocols, and applying STIGs. Experience and proficient with cyber tools for vulnerability assessments, SEIM, Endpoint protection and security frameworks. Strong understanding of risk management and experience with familiarity with cloud security principles Soft skills include excellent communication and interpersonal skills, strong attention to detail, ability to multi-task and to collaborate in a team environment For ability to obtain and maintain a security clearance, US Citizenship is Legally Required Preferred Qualifications: Understanding of NIST Risk Management Framework and Control Sets (i.e., NIST 800-37 and NIST 800-53) Current of former experience with DOE cybersecurity or a federal-contractor cybersecurity technical position Experience with zero-trust architecture Ability to learn new technologies, concepts, and processes quickly Splunk or Tenable Certifications Active DOE clearance Team in designing, implementing, and maintaining secure environments applying the NIST RMF framework. Develop strategies for complex security strategies unique to their operating environment. Implement enforceable technical security controls for protection of networks and systems using authorized sources such as STIGs and SRGs Support the ISSO with the technical aspects of the development and ongoing maintenance of security controls and authorization activities Perform and review technical assessments and security reports Work effectively in a team environment to resolve issues and contribute to continuous process improvement efforts Interact with customers and peers in a professional and responsive manner to ensure secure practices. Provide expert support and communicate effectively on security matters
    $59k-83k yearly est. Auto-Apply 3d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Columbia, SC

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding. **Responsibilities:** + **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture. + **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders. + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 29d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in West Columbia, SC?

The average cyber security analyst in West Columbia, SC earns between $56,000 and $100,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in West Columbia, SC

$75,000
Job type you want
Full Time
Part Time
Internship
Temporary