Post job

Information security analyst jobs in Charleston, SC - 115 jobs

All
Information Security Analyst
Securities Analyst
Information Technology Analyst
Security Engineer
Cyber Security Engineer
Information Security Engineer
Senior Security Analyst
Information Systems Security Officer
Cyber Security Analyst
Information Security Manager
Information Systems Security Manager
Information Assurance
Director Of Information Technology Security
  • Entry Level Healthcare IT Analyst

    Optimum Healthcare It 4.3company rating

    Information security analyst job in Charleston, SC

    Start Your Career in Healthcare Information Technology Today! Getting your first job can be difficult when employers want experience, but to gain that experience, you need your first job. We bridge the gap between your education and professional career by helping you gain the experience and training you need within the Healthcare Information Technology Industry. Optimum Healthcare IT is looking for recent college graduates with an interest in moving into the Healthcare IT Industry. Our Optimum CareerPath training program will equip you with the tools needed for your success as a Healthcare IT Analyst. Healthcare IT Analyst Job Responsibilities: · The Healthcare IT Analyst will have primary responsibility for the design, build/configuration, testing, validation, documentation, and ongoing support for the Healthcare applications. · This position will implement, administer, and support assigned systems under the guidance of senior members of the team. · The position will have a good understanding of healthcare organizations, ancillary systems, and health system operations. · Analyze and document user requirements, procedures, and problems to automate or improve existing systems. Review system capabilities, workflow, and scheduling limitations. · Document workflows, configure and/or build activities, change management adherence, end-user notifications, training information, and status reporting in the appropriate system. · Develop, document, and revise system design procedures, test procedures, and quality standards. · Expand or modify the system to serve new purposes or improve workflows. · Review and analyze the system and performance indicators to locate problems and correct errors. Escalate problems and issues to the appropriate staff to ensure timely resolution. · Coordinate projects, schedule, and facilitate meetings as necessary to complete assignments. · Technical and functional analyst support of systems that may include Electronic Health Records platforms (Epic, Cerner), IT Project Management, ERP Systems (Workday, Oracle, PeopleSoft, UKG), ITSM applications (ServiceNow), data and analytics applications (Tableau, PowerBI), cloud deployments (GCP, Azure, AWS), and other digital platforms and services. Requirements: · Bachelor's Degree · US work authorization (This position is not open to any H1B /F1/ H-4 EAD OPT/STEM degrees) · Excellent communication skills (verbal and written) · Ability to exercise tact and good interpersonal skills · Superb analytical and time management skills required · Self-starter, self-motivated, high level of initiative · Result-focused, ability to solve complex problems and resolve conflicts in a timely manner · Internships or research project work are highly desired in a healthcare setting · Understanding of how data works and looks, coming from different formats, is preferred · Ability to travel during the training program if necessary
    $57k-78k yearly est. 2d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Sr. Security Analyst

    Maximus 4.3company rating

    Information security analyst job in Charleston, SC

    Description & Requirements Maximus is seeking a qualified Sr. Technical/Security Analyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned. *This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. * Essential Duties and Responsibilities: - Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary. - Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget. - Work closely with management and work groups to create and maintain work plan documents. - Track the status and due dates of projects. - Manage relationships with project staff responsible for projects. - Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed. - Facilitate regular meetings and reviews. - Adhere to contract requirements and comply with all corporate policies and procedures. Job Specific Duties and Responsibilities: -Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects. -Review project documentation and client materials and provide analysis of technical and security related topics. -Participate in client meetings and offer observations and insight on technical and security related topics. -Identify risk areas and potential problems that require proactive attention. -Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to: *System Security Plan *Plan of Action and Milestones (POA&M) *Security Assessment Plan *Risk Assessment reports *CMS ARC-AMPE forms and documentation *Data Conversion and Migration Management Plan *Deployment and/or roll-out plans -Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects. -Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues. -Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work. -Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager. -Complete project work in compliance with Maximus standards and procedures. -Support team to complete assigned responsibilities as outlined in the Project schedule. -Support all other tasks assigned by Senior Manager / Project Manager. Minimum Requirements - Bachelor's degree in related field. - 7-10 years of relevant professional experience required. - Equivalent combination of education and experience considered in lieu of degree. Job Specific Requirements: -Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required. -Bachelor's degree from an accredited college or university, or equivalent work experience. -7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry. -5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks. -Familiar with operating systems: Windows, Linux/UNIX, OS/X. -Familiar with AI tools, capabilities. -Strong command of cloud computing topics. -Strong command of agile software development practices as well as waterfall development practices. -Strong desktop software skills: proficient in MS Office, Excel, Word, Project. -Ability to explain and communicate technical subjects to non-technical audiences. -Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills. -Ability to work independently. -Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously. -Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential. -Excellent verbal and writing skills and be comfortable working with customers. -Ability to multi-task with supervision. -Self-motivated fast learner. Preferred Skills: -Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid). -Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional). EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************. Minimum Salary $ 120,000.00 Maximum Salary $ 140,000.00
    $80k-107k yearly est. Easy Apply 9d ago
  • Cyber Security Engineer

    Atlas Executive Consulting

    Information security analyst job in Charleston, SC

    Are you searching for an opportunity to take your career to the next level? Ignite Digital Services is a fast-growing digital transformation company serving the national security sector. Our small business applies data science, program management and technical domain expertise to help clients implement data-driven approaches that maximize operational efficiencies. We've redefined what it means to be a leader in our industry by creating and maintaining effective and rewarding working relationships with our clients, partners and internal team members. Our company culture is built upon a team-based approach, which offers continuous opportunities for personal growth and innovation, while providing unmatched value to our clients. Perks of Working at Ignite Digital Services: * Competitive pay and benefits, including PTO * Education stipends and referral bonuses * Compelling work with the U.S. federal government * Strong emphasis on volunteer and community engagement * Opportunity to shape the future of our industry * Supportive colleagues and management who invest in your growth Ignite Digital, has an exciting opportunity for a Principal, Cyber Security Engineer in Charleston, SC to support our client engagements within the federal government. The ideal candidate is a self-starter with strong cybersecurity skills and a strong work ethic. This position serves an important role in supporting a DevSecOps software development program and producing business process improvements. The individual will implement state-of-the-art best cybersecurity practices to ensure software code meets rigorous security audits and testing. Responsibilities: * Evaluate, develop, and implement cybersecurity code review solutions within current business processes to optimize efficiencies in collaboration with software developers. * Identify methods to collect, analyze, and manage data with the goal of making recommendations to accelerate the Risk Management Framework process within a DevSecOps environment. * Conducts vulnerability testing and scanning, incident response, disaster recovery, and business continuity planning and provides analytical support for security policy development and analysis. * Evaluated incident response procedures and capabilities through Red Team exercises. * Exploited system and network vulnerabilities and misconfigurations for the purpose of gathering data from target or adversary automated information systems or networks and to enable operations and intelligence collection capabilities. * Monitored, analyzed, and detected Cyber events and incidents within information systems and networks. * Planned, implemented, managed, monitored and upgraded security measures for the protection of the organizations data, systems and networks. * Developed security assessment plans for systems, including the objectives, scope, schedule, required documentation, possible risks, and other logistical items for security assessments; developed cloud service provider testing approach from security perspective. * Evaluate the performance and applicability of software code review tools against customer and client requirements * Foster collaborative business relationships with stakeholders, business partners, and team members * Assist in the training and development of the command workforce to increase the ability to produce secure software code Minimum Qualifications: * Ability to obtain a DoD security clearance * Bachelor of Science Degree in Engineering, Computer Science or Information Systems * Fifteen (15) years in cyber security to include: Maintained the information security activities to preserve the availability, integrity, and confidentiality of information resources in compliance with applicable security policies and standards. * Experience performing cybersecurity requirements definition, security risk assessment, systems analysis, systems design, security test and evaluation, certification and accreditation, and systems hardening. * Demonstrated experience supporting Risk Management Framework (RMF)/ FedRAMP system certification. * Demonstrated ability to take initiative and work independently and quickly transition to reassess priorities. * Must have Security+ certification Preferred Qualifications: * Active DoD security clearance * Knowledge of the system development life cycle, software project management approaches and requirements, design and test techniques including experience working in a DevOps/DevSecOps delivery environment * Experience in mentoring/training/coaching others in technical concepts * Adapts quickly to new situations, is willing to learn new technologies and works well in a team environment, leading individual projects without the need for supervision * Ability to obtain a DoD Government Security Clearance is mandatory for this position* Salary: $150k+ to align with education, certification, & experience Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information. Ignite Digital Services is a Small Business committed to providing exceptional service to government agencies at competitive prices. The capabilities and experience of our staff and our extensive industry relationships distinguish Ignite Digital Services among government contractors. Equal Opportunity Employer/Veterans/Disabled For individuals who would like to request an accommodation, please visit ********************** (CA) or ********************** (SC) or contact Human Resources. Ignite Digital Services will not make any posting or employment decision that does not comply with applicable laws relating to labor and employment, equal employment opportunity, employment eligibility requirements or related matters. Nor will Ignite Digital Services require, in a posting or otherwise, U.S. citizenship or lawful permanent residency in the U.S. as a condition of employment except as necessary to comply with law, regulation, executive order, or federal, state, or local government contract. OFCCP'S Pay Transparency Rule EEO is the Law Poster Create a Job Alert Interested in building your career at Ignite Digital Services? Get future opportunities sent straight to your email. Create alert
    $150k yearly 60d+ ago
  • Information System Security Officer

    Ifas LLC

    Information security analyst job in Charleston, SC

    The U.S. Department of State (DoS), Comptroller and Global Financial Services (CGFS), Chief Information Officer, Information Systems Security Office (CGFS/CIO/ISSO) requires the contractor to provide analytical and coordination support in the Information Systems Security Office (ISSO) as a Security Analyst in applying interrelationships of multiple Cybersecurity specialties; IT architecture; new IA developments and applications; emerging technologies and their applications to business processes; IT security concepts, standards, and methods; project management principles and methods. Minimum Requirements Four-year degree in computer science, business, or closely related area. Technical certification in computer systems security and a minimum of 5 years' experience in intrusion detection, vulnerability assessments, and network diagnostics. Experience with DoS computer security policies and guidelines. Security+ certification is required; CompTIA+ certification is preferred. Job Responsibilities CGFS Charleston ISSO Information Assurance and Risk Management Framework (RMF). User creation and conditional email assignment of user and administrative accounts on CGFS General Support Systems. Active role in network and systems design to ensure that appropriate systems security policies and procedures are contemplated and introduced into designs at the outset. Assess breaches of security to determine their impact on system operations and the confidentiality, integrity, and reliability of the information stored and manipulated within the system. Applies findings to the development of corrective measures and user awareness. Creation and maintenance of users for CGFS Financial Applications. Creation and updating of Treasury Keys for supported applications. Storing and distribution of classified peripheral devices. Creation and maintenance of network drive folder file permissions. Documenting visiting Government and Non-Government visitor's laptops. Support internal and external access management audits. Create and maintain ISO 9001 documentation for engineering and access management efforts Ability to communicate technical as well as non-technical information clearly, both orally and in writing. Brief and maintain documentation for all users on automated information systems (AIS). SharePoint development and maintenance. Provide tier III support for all Information Systems Security. Create, modify, and delete user accounts on automated information systems. Security Clearance Requirement All contractors supporting this Department must be able to either possess or obtain a security clearance of “Top Secret/SCI.” Important note to consider : A Secret Clearance will open a lot of other doors for your career in the Government to include possibilities of being hired directly. Work Schedule The employee will work an 8-hour shift between the hours of 6:15 am to 6:00 pm with a non-compensated 45-minute lunch (See your Project Manager for work schedule and department policies). Additional hours may be required and must be authorized by your Project Manager and DoS Management. This position requires 5 days on-site. Software Systems Utilized: Basic knowledge and experience with Windows 2012/2016/or future elaborations Server network environment. Basic knowledge and experience on personal computers running Windows 10 or future elaborations workstation in a Windows network environment. Experience with PC workstation operations including word processing, spreadsheets, and electronic mail, as well as knowledge of Windows 10 or future elaborations system internals such as the registry. Ability to communicate technical as well as non-technical information clearly, both orally and in writing. Formal Job-Specific Training Requirements: IA 201 - Information Assurance for System Administrators Our Most Successful Employees in this Position Demonstrate: An understanding of the mission and business functions of the organization. An ability to build relationships with key personnel who have authority or ability to ensure compliance with security laws, regulations, guidance, and requirements. An ability to troubleshoot issues while maintaining appropriate operational security posture.
    $60k-82k yearly est. Auto-Apply 60d+ ago
  • Information System Security Officer

    IFAS LLC

    Information security analyst job in Charleston, SC

    Job Description The U.S. Department of State (DoS), Comptroller and Global Financial Services (CGFS), Chief Information Officer, Information Systems Security Office (CGFS/CIO/ISSO) requires the contractor to provide analytical and coordination support in the Information Systems Security Office (ISSO) as a Security Analyst in applying interrelationships of multiple Cybersecurity specialties; IT architecture; new IA developments and applications; emerging technologies and their applications to business processes; IT security concepts, standards, and methods; project management principles and methods. Minimum Requirements Four-year degree in computer science, business, or closely related area. Technical certification in computer systems security and a minimum of 5 years' experience in intrusion detection, vulnerability assessments, and network diagnostics. Experience with DoS computer security policies and guidelines. Security+ certification is required; CompTIA+ certification is preferred. Job Responsibilities CGFS Charleston ISSO Information Assurance and Risk Management Framework (RMF). User creation and conditional email assignment of user and administrative accounts on CGFS General Support Systems. Active role in network and systems design to ensure that appropriate systems security policies and procedures are contemplated and introduced into designs at the outset. Assess breaches of security to determine their impact on system operations and the confidentiality, integrity, and reliability of the information stored and manipulated within the system. Applies findings to the development of corrective measures and user awareness. Creation and maintenance of users for CGFS Financial Applications. Creation and updating of Treasury Keys for supported applications. Storing and distribution of classified peripheral devices. Creation and maintenance of network drive folder file permissions. Documenting visiting Government and Non-Government visitor's laptops. Support internal and external access management audits. Create and maintain ISO 9001 documentation for engineering and access management efforts Ability to communicate technical as well as non-technical information clearly, both orally and in writing. Brief and maintain documentation for all users on automated information systems (AIS). SharePoint development and maintenance. Provide tier III support for all Information Systems Security. Create, modify, and delete user accounts on automated information systems. Security Clearance Requirement All contractors supporting this Department must be able to either possess or obtain a security clearance of “Top Secret/SCI.” Important note to consider : A Secret Clearance will open a lot of other doors for your career in the Government to include possibilities of being hired directly. Work Schedule The employee will work an 8-hour shift between the hours of 6:15 am to 6:00 pm with a non-compensated 45-minute lunch (See your Project Manager for work schedule and department policies). Additional hours may be required and must be authorized by your Project Manager and DoS Management. This position requires 5 days on-site. Software Systems Utilized: Basic knowledge and experience with Windows 2012/2016/or future elaborations Server network environment. Basic knowledge and experience on personal computers running Windows 10 or future elaborations workstation in a Windows network environment. Experience with PC workstation operations including word processing, spreadsheets, and electronic mail, as well as knowledge of Windows 10 or future elaborations system internals such as the registry. Ability to communicate technical as well as non-technical information clearly, both orally and in writing. Formal Job-Specific Training Requirements: IA 201 - Information Assurance for System Administrators Our Most Successful Employees in this Position Demonstrate: An understanding of the mission and business functions of the organization. An ability to build relationships with key personnel who have authority or ability to ensure compliance with security laws, regulations, guidance, and requirements. An ability to troubleshoot issues while maintaining appropriate operational security posture.
    $60k-82k yearly est. 19d ago
  • Cyber Security Analyst (ISSO)

    Savannah River National Laboratory 4.5company rating

    Information security analyst job in Aiken, SC

    Savannah River National Laboratory (SRNL) is seeking an Cyber Security Analyst (ISSO) to join our Cyber team! The selected individual will serve as the owner of the day-to-day execution of the NIST Risk Management Framework for assigned systems throughout their lifecycle. This is a full-time position ideal for someone with hands-on ISSO or security control assessor experience in a government-contractor environment. The ISSO must team with many professionals across the lab and with the DOE assigned Information System Security Manager to ensure the boundary security controls are in place and maintained. Minimum Qualifications: Bachelor's degree in Computer Science, Information Management/Assurance, or similar 7 years of relevant experience in contractor-federal appointed ISSO or Security Control Assessor role Have demonstrated proficiency in NIST Risk Management Framework and Security Control Sets (i.e., NIST 800-37 and NIST 800-53) For ability to obtain and maintain a security clearance, US Citizenship is Legally Required Preferred Qualifications: Current of former experience with DOE cybersecurity or a federal-contractor cybersecurity technical position Strong attention to detail and writing skills leading to accurate, clear, and concise control implementations that withstand scrutiny Ability to produce accurate, well-structured and audience appropriate security documentation able to be understood by assessors, technical teams, system owners and senior leaders/managers Effective verbal briefing with the ability to translate technical information into business/mission risk impacts Soft skills to include excellent communication and interpersonal skills, strong attention to detail, ability to multi-task and to collaborate in a team environment Experience with information assurance and cyber tools (GRC, Tenable.SC, Nessus, Splunk, etc.) Ability to quickly learn new technologies, concepts, and processes Active DOE L or Q clearance Develop, maintain, and oversee System Security Plans and other boundary supporting documents in accordance with the NIST RMF and applicable policies Act in owner/oversight capacity for day-to-day cybersecurity functions for the assigned systems, ensuring controls are implemented correctly, operating as intended, and documented correctly Manage and track all risks for the boundary in designated risk registers and prepare a consolidated annual boundary risk assessment. Oversee information security categorizations of new and/or updated security categorizations for system/applications with the data owners (FIPS 199 and NIST SP 800-60) Ensure proper selection and tailoring of security controls are documented with clear and concise implementations Participate in the SRNL Change Review Board Maintain and ensure execution of the continuous monitoring strategy for the (AO) approved controls Prepare a Security Authorization Packages for new projects and for the boundary for submission to DOE for obtaining or renewing an Authority to Operate Coordinate activities with compliance assessment teams, providing artifacts and evidence of compliance as requested Take ownership of any issues in Security Assessment Report related to the systems assigned Support in a timely manner external audits, FISMA reporting, and other Data Calls Assist in identifying acceptable risk tolerances for the AO/AODR where appropriate for SRNL to manage internally any item with negligible to very low risks for the boundary Support and guide Project Security Officers within the boundary with security management of their systems in accordance with their appointment letters Conduct or review and approve security impact analysis for systems and networks undergoing significant security changes that could affect the system's authorization status. Provide timely notification to the AO/AODR for incidents and changes that may affect the system's authorization status Maintains mutually beneficial partnerships with other functions and seeks support for functional projects within and outside the function
    $59k-83k yearly est. Auto-Apply 1d ago
  • Manager, Information Security Policy and Controls Governance

    Unum Group 4.4company rating

    Information security analyst job in Columbia, SC

    Our Fortune 500 company is driving a digital transformation and looking for forward-thinking innovators to disrupt how our industry thinks about and uses technology. As one of the world's leading employee benefits providers, we help millions of people gain affordable access to benefits that help them protect their families, their finances and their futures. Are you an asker of questions, a solver of problems, and a challenger of the status quo? Our mission is to provide a differentiated customer experience and exceed the expectations people have of technology at any company - not just insurers. We are seeking individuals to join our team of talented IT professionals who share never-ending passion and an unwavering focus on our customer experience. Team members comfortable working in an agile, fast-paced, and delivery-focused environment thrive in our environment where we value an entrepreneurial spirit and those who challenge the status-quo. Unum is changing, and we're excited about what's next. Join us. **General Summary:** The Manager - Information Security Policy and Controls Governance is responsible for strategic enhancement and day-to-day operation of key governance, risk, and compliance capabilities, including policy and standards governance, enterprise and application-level risk assessments, and controls management and attestation programs. This role will oversee the full lifecycle of governing documents, manage policy exceptions, coordinate external and regulatory assessments, and ensure strong alignment between security controls and regulatory requirements. The manager will also drive consistent, timely issues management across all domains. This leader will partner closely with stakeholders across the organization to mature processes, strengthen compliance posture, and ensure effective, repeatable execution of GRC activities. They will manage a small to mid-size team of IT security and risk management professionals. **Job Specifications** + Bachelors degree in computer science, or relevant technical experience + Has 5+ years experience in an IT Risk Management field, or equivalent relevant work experience + Has a security technology background with strong knowledge of relevant technical security disciplines + Exhibits courage by taking smart risks and encouraging others to do so; empowers innovative approaches by motivating others to be proactive and resourceful + Able to effectively coach, mentor, identify, and address skills needs and gaps + Proficient in methods and techniques for running effective meetings and for understanding and influencing the roles played by participants + Displays good interpersonal skills at all levels of contact and in a wide variety of situations, able to listen and influence, and to relate to customers in their own language + Demonstrates the ability to champion change and support teams through change. + Demonstrates the ability to think critically, challenge conventional thinking and generate and apply unique business insight to create competitive advantage for the organization + Has solid knowledge of regulations, including, GLPA, HIPAA, GDPR, CCPA, and other cyber security regulatory compliance requirements and related programs + Has in-depth knowledge of security and control frameworks such as the NIST Cyber Security Framework, NIST SP 800-53, ISO 17799/27001, CobIT, and ITIL + CRISC, CISSP, CISM, CISA, and other security related certifications are a plus **Principal Duties and Responsibilities** + Oversees and evaluates the delivery and effectiveness of the organizations policy governance, risk assessments, control attestation, and issues management capabilities, taking action to address performance or quality gaps as needed. + Ensures the team maintains a well‑defined, risk‑aligned backlog of work that advances program maturity and meets regulatory, audit, and business needs. + Guides team members in prioritizing assessments, policy lifecycle activities, and control-related work based on risk, business value, and regulatory timelines. + Proactively removes obstacles and operational roadblocks that hinder timely completion of assessments, attestations, and governance processes. + Partners with business and technology stakeholders to translate security, compliance, and risk management objectives into actionable work items. + Ensures best‑practice execution, including structured assessment methodologies, clear control documentation, consistent issue tracking, adherence to policy standards, and high‑quality evidence collection. + Encourages creativity and continuous improvement in maturing governance, assessment, and control processes; fosters a culture of innovation within the team. + Uses operational metrics, assessment cycle data, and workflow insights to understand team performance and drive process efficiency. + Partners with leadership to ensure strong talent is in place to support the organization's governance, risk and compliance obligations. + Mentors, coaches, and motivates team members to elevate their GRC expertise, business partnership skills, and overall performance. + Identifies skill gaps related to risk frameworks, regulatory requirements, control design, and assessment techniques, ensuring development plans address these needs. + Promotes cross‑training and shared ownership of GRC functions to reduce single‑points‑of‑failure and increase team resilience. + While accountable for the team's output, actively cultivates a self‑organizing, autonomous, and collaborative team that consistently demonstrates accountability and continuous improvement. + Conducts regular 1:1s and development discussions to monitor progress, reinforce strengths, and close skill gaps. + Collaborates with peers to evaluate the effectiveness of resourcing models, proposing enhancements to better support team operations. + Maintains a strong understanding of emerging regulatory trends, risk frameworks (e.g., NIST CSF, HIPAA, SOC, ISO), and control expectations to inform program improvements. + Reinforces disciplined prioritization by ensuring the team focuses on the highest‑value, highest‑risk activities and commitments. + Designs and operates GRC processes with partner teams' knowledge and needs in mind, ensuring risk governance activities are clear, intuitive, and easy to complete. \#LI-TO1 \#LI-MULTI IN4 Our company is built on helping individuals and families, and this starts with our employees. We want employees to maintain a positive balance, which is why we provide access to the benefits and resources they need to invest in themselves. From our onsite fitness facilities and generous paid time off to employee professional development programs, we are committed to helping employees live and work their best - both inside and outside the office. Unum is an equal opportunity employer, considering all qualified applicants and employees for hiring, placement, and advancement, without regard to a person's race, color, religion, national origin, age, genetic information, military status, gender, sexual orientation, gender identity or expression, disability, or protected veteran status. The base salary range for applicants for this position is listed below. Unless actual salary is indicated above in the job description, actual pay will be based on skill, geographical location and experience. $89,400.00-$183,500.00 Additionally, Unum offers a portfolio of benefits and rewards that are competitive and comprehensive including healthcare benefits (health, vision, dental), insurance benefits (short & long-term disability), performance-based incentive plans, paid time off, and a 401(k) retirement plan with an employer match up to 5% and an additional 4.5% contribution whether you contribute to the plan or not. All benefits are subject to the terms and conditions of individual Plans. Company: Unum
    $89.4k-183.5k yearly 16d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Information security analyst job in Columbia, SC

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 60d+ ago
  • Security Engineer

    Barndoor Ai 4.1company rating

    Information security analyst job in Charleston, SC

    Who we are We help enterprises unlock the future of AI, and realize untapped potential through a thoughtful approach to access, security, and scalability. We're a growing startup at the forefront of enterprise GenAI infrastructure. We are building a next-generation platform that empowers enterprises to securely adopt and manage advanced AI workflows. We know that successful technology adoption hinges on secure and appropriate access. Our founding team helped shape past technology revolutions - from pioneering secure API Management during the rise of mobile apps to driving enterprise AI adoption across Fortune 100 enterprises. At the core of all we do is our team. We're made up of builders, creators, and curious minds, on a mission to make AI safer, more responsible. Just as we are thoughtful about our products, we're thoughtful about how we build teams and our culture. We believe with each addition to the team, culture can be enhanced. Take a look at what we value in our About Barndoor page. If this speaks to you, we'd love to hear from you! How you'll make an impact Security is foundational to everything we build. As our core Security Engineer, you will directly continue to shape the architecture, policies, and culture that scale our secure software. The systems you design will enable our customers-enterprises with complex regulatory and operational needs-to safely deploy AI-powered agents at scale. Your work won't just prevent breaches-it will enable trust, unlock innovation, and differentiate our platform in the market. What You'll Be Working OnWhile all roles have fluidity, here's a sense of some of what you might work on at any given time. Core responsibilities and role responsibilities include: Responsibilities Audit and strengthen OAuth 2.0 and OIDC token flows across internal proxies, the control plane, and third-party integrations Identify and mitigate common and emerging threats in delegated authentication workflows Review and co-design REST, WebSocket, and streaming APIs with strong boundaries, secure defaults, and least-privilege access models Help define system boundaries for multi-agent, multi-tenant orchestration Integrate and tune automated CVE, SCA, and IaC scanning tools into CI/CD pipelines Convert security findings into high-signal engineering tickets with practical remediation paths Lead lightweight, iterative threat models for new features and services Define internal security baselines and policies, and mentor others to promote a strong security culture Favor automation-friendly controls over burdensome manual security processes Contribute to compliance initiatives such as SOC 2 and ISO 27001, supporting scalable security programs Leverage deep expertise in OAuth 2.0/OIDC with real-world experience securing authentication flows in production systems Design secure APIs, review system architectures, and implement scalable authentication and authorization models Apply hands-on experience with supply chain and container security tools such as Trivy, Snyk, Grype, and Terraform scanning Demonstrate familiarity with modern identity platforms like Auth0, Okta, and Keycloak, and with Zero Trust models Requirements 5+ years in application or platform security roles, ideally in high-growth SaaS or cloud-native environments. Deep expertise in OAuth 2.0/OIDC, including real-world experience securing auth flows in production systems. Strong track record designing secure APIs, reviewing system architectures, and implementing scalable authN/authZ models. Hands-on experience with supply chain and container security tools (e.g., Trivy, Snyk, Grype, Terraform scanning). Familiarity with modern identity platforms (Auth0, Okta, Keycloak) or Zero Trust models. Proven success contributing to SOC 2, ISO 27001, and overall compliance programs. Experience working with AI/ML platforms or agent-based architectures. Comfortable collaborating with infrastructure, product, and legal teams to align security priorities with company goals. Passion for mentorship, documentation, and building a strong security culture without over-engineering. Soft Skills That Matter Here Startup Agility: You thrive in fast-paced, evolving environments and are quick to take initiative without waiting for perfect clarity. Ownership Mentality: You see a gap and step in-you don't wait to be told what needs securing, you go find it. Collaborative Spirit: You work well across functions-engineering, product, sales, and beyond-to elevate the entire team's security awareness. Pragmatic Mindset: You balance ideal security outcomes with real-world constraints, always looking for simple, sustainable solutions. Mentorship and Influence: You uplift teammates by sharing knowledge and helping others build security into their everyday thinking. Travel RequirementsTeam connection is an important part of our culture. With a remote-friendly structure, we do require that our team be available to travel for in-person collaboration sessions and meetings. Some roles may have more travel than others. Typical team meetups are every 6-8 weeks, however, this may vary depending on team and business needs. We work to plan out our travel schedules in advance to give as much notice as possible. Equal Opportunity EmployerWe celebrate diversity and are committed to creating an inclusive environment for all employees. We do not discriminate based on race, color, ancestry, national origin, citizenship, religion or creed, sex (including pregnancy, childbirth, and related conditions), sexual orientation, gender identity or expression, age, marital status, veteran status, disability, genetic information, or any other legally protected status. We believe that diverse teams build better products, and we strive to ensure that our hiring, development, and advancement practices are fair, equitable, and welcoming for everyone.
    $81k-112k yearly est. Auto-Apply 60d+ ago
  • Security Analyst

    Msysinc

    Information security analyst job in Clover, SC

    REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE): 6 years information security experience Excellent written skills; Proven work experience in process improvement Ability to identify processes that must be in place for an IT organization to be efficient Extensive knowledge of IRS Pub 1075, NIST 800-53, ITIL, and CJIS Process Management ITIL Business Analysis experience to include data flow diagrams, requirements specifications, use case scenarios, and acceptance testing. Ability to work with security technicians to develop detailed procedures; Ability to quickly grasp complex technical concepts and make them easily understandable in both text and diagrams/flow charts Ability to deliver high quality documentation with attention to detail. REQUIRED EDUCATION: Bachelor's Degree in a relevant field of work or equivalent work experience. Additional Information All your information will be kept confidential according to EEO guidelines.
    $56k-77k yearly est. 3d ago
  • Security Analyst

    Novalink Solutions LLC 3.1company rating

    Information security analyst job in West Columbia, SC

    Job DescriptionProviding security and continuous monitoring in a complex network environment across the state of South Carolina. Network includes on-prem and cloud technology supporting 50+ mission critical applications and sites. Daily administration of modern tools including Tenable products, PAN Cortex XDR, Office 365 Security, and MS Defender. A small security team means every member gets the opportunity to work in different security functions including incident detection and response, vulnerability management, identity and access management, and physical security. Must possess excellent written and verbal communication skills as these are employed often with interdepartmental and external communications in problem solving. WHY IS THIS POSITION OPEN? Rebid - 36-Month tenure reached. WHAT TYPES OF STAFFING CHALLENGES OR HEADACHES HAVE YOU EXPERIENCED IN THE PAST? QUALITY OF RESUME? During the interviews, often we're finding that the candidates don't have the skills or experience that they have outlined on their resumes, resulting in a waste of time for all parties. We need better vetting from the vendors. SCOPE OF THE PROJECT: The Office of the CISO is responsible for securing and monitoring the agency's critical applications and network for the Department of Social Services. The Department seeks a highly motivated individual who has the skills and experience needed to support this Office's mission in protecting the Agency's digital environment. DAILY DUTIES / RESPONSIBILITIES: Position Description - Security Analyst - Project Lead • Candidate should be an expert security administration and security continuous monitoring. • Candidate should be an expert in performing log analysis, risk analysis, incident response processes, and investigation procedures. This includes experience working in a security operations center and working with security tools including SIEM, EDR/XDR, IPS/IDS. Candidate should have experience with data blending and report generation. Job Duties: • Planning, implementing, upgrading, and monitoring security measures for the protection of computer network security and information - both LAN and cloud based. • Develop and implement security policies, procedures, and standards to protect the organization's data and assets. • Monitoring and reporting on SIEM and EDR event data. • Maintaining records of security events investigated and incident response activities. • Serve as a Tier III security support on the agency's security team. • Conduct security assessments of systems, networks, and applications to identify vulnerabilities and risks. • Work with and provide mentorship to other information security team members on security strategies, processes, response, and technologies. • Respond to security incidents and breaches, and work to mitigate the impact and prevent future incidents. • Provides incident response support, threat assessment, and computer forensic investigations. • Coordinate and assist with other Information Technology functions/teams to accomplish agency security objectives. • Creating risk analysis documents when reviewing system functional specifications including use cases, activity, sequence, data flow, collaboration, and diagrams. • Create security report using complex SQL queries, API integrations, and Power BI. • Knowledge of blue team tools such as SCAP workbench, vulnerability scanning, and hardening techniques. • Knowledge of red team tools such as nmap, wireshark, Metasploit, and password crackers. REQUIRED SKILLS: (Rank in order of importance) • 4+ years of experience with SIEM, EDR/XDR, and IPS/IDS • 4+ years of experience with security documentation • 4+ years of experience with C/C++, Python, or Powershell • 4+ years of experience with Red/Blue Team • 4+ years of experience with Office 365 Security Administration PREFERRED SKILLS: (rank in order of Importance) • Preference will be given to experienced Security Operation Center (SOC) security analyst. • SQL/Scripting (reports and automation) experience. REQUIRED EDUCATION/CERTIFICATIONS: Bachelor's or higher degree in Computer Science or other quantitative discipline or equivalent work experience. PREFERRED EDUCATION/CERTIFICATIONS: Any of the below. • CISSP • CCSP • SSCP • CEH RequirementsRequired Skills Skill Type Skill Name CertificationEducationLicenseOtherSkill4+ years of experience with SIEM, EDR/XDR, and IPS/IDS CertificationEducationLicenseOtherSkill4+ years of experience with security documentation CertificationEducationLicenseOtherSkill4+ years of experience with C/C++, Python, or Powershell CertificationEducationLicenseOtherSkill4+ years of experience with Red/Blue Team CertificationEducationLicenseOtherSkill4+ years of experience with Office 365 Security Administration Preferred Skills Skill Type Skill Name CertificationEducationLicenseOtherSkillPrevious experience as a Security Operation Center (SOC) security analyst. CertificationEducationLicenseOtherSkillSQL/Scripting (reports and automation) experience CertificationEducationLicenseOtherSkillCISSP CertificationEducationLicenseOtherSkillCSSP CertificationEducationLicenseOtherSkillSSCP CertificationEducationLicenseOtherSkillCEH
    $57k-85k yearly est. 9d ago
  • Security Analyst - Advanced

    Sunshine Enterprise USA LLC

    Information security analyst job in Abbeville, SC

    Job DescriptionJob Title: Security Analyst - Advanced Client/Agency: State of South Carolina - DSS (Office of Information Technology) Contract Duration: 12 Months (Extension possible) Start Date: 02/17/2026 | Deadline 01/23/2026 Schedule: 40 hrs/week | 8:00 AM - 5:00 PM (Day Shift) Interview Process: 1 Round (Microsoft Teams - Video Required) Max Bill Rate: $50-$53/hour Work Authorization: Must be eligible to work in the U.S. Residency Requirement: Candidate must be a CURRENT South Carolina resident (No relocation allowed) Security Requirement: Yes Position Overview The State of South Carolina - Department of Social Services (DSS), Office of Information Technology, is seeking a highly skilled Security Analyst - Advanced to support enterprise cybersecurity operations. This role will focus on monitoring, analyzing, and responding to security threats across the environment while supporting detection and response tools such as SIEM, EDR/XDR, and IDS/IPS. The ideal candidate will have strong experience in security documentation, Office 365 security administration, scripting/programming, and working within Red/Blue Team environments. Key Responsibilities · Monitor, investigate, and respond to security incidents using SIEM, EDR/XDR, and IDS/IPS tools. · Perform threat analysis, event correlation, and escalation of security risks and vulnerabilities. · Support incident response activities including triage, containment, remediation, and reporting. · Develop and maintain cybersecurity documentation, procedures, and security playbooks. · Assist with Office 365 Security Administration, including security configurations and monitoring. · Support proactive threat hunting and security improvement initiatives through Red/Blue Team collaboration. · Build scripts/tools to improve automation, reporting, and response capabilities using Python, PowerShell, or C/C++. · Work closely with IT teams to strengthen security posture and implement best practices. Required Skills & Experience · 4+ years of experience with SIEM, EDR/XDR, and IPS/IDS · 4+ years of experience creating and maintaining security documentation · 4+ years of experience with C/C++, Python, or PowerShell · 4+ years of experience working with Red/Blue Team methodologies · 4+ years of experience with Office 365 Security Administration Preferred Skills · Prior experience as a Security Operations Center (SOC) Security Analyst · SQL/Scripting experience for reporting and automation Preferred Certifications · CISSP · CSSP · SSCP · CEH Work Location & Residency Requirement · Hybrid schedule: 1 day onsite per week in Columbia, SC · Candidate must be a CURRENT SC resident (No relocation allowed) Sunshine Enterprise USA is an “Equal Opportunity Employer-Minorities, Females, Veterans and Disabled Persons”
    $50-53 hourly 5d ago
  • Security Analyst

    Ask It Consulting

    Information security analyst job in Columbia, SC

    ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations. We have openings for Security Analyst for one of our client in Columbia, SC. Job Description Position: Security Analyst Location: Columbia, SC 29210 Duration: 12 Months Position Description: Previous experience as a principle level object oriented developer with in depth knowledge of software development security principles. In depth knowledge of the Windows kernel and developing Windows based device drivers. You will assist in the design, develop, and implementation of systems security for our existing production systems (Primarily Windows Based). Requirements: • Bachelor's degree in computer science or related discipline, Master's degree preferred. • 5+ years of professional software development experience. More is better. • Strong knowledge and skills in Windows databases, optimizing queries, SQL Injection attacks, OWASP Top 10 remediation techniques, and ensuring sensitive data is secure in use, transit and at rest. • Strong knowledge and skills in Windows internals, debugging and reverse engineering. • Strong knowledge of Windows Security such as Token / Privileges /SID /ACLs /Group Policy /Active Directory. • Demonstrated ability to design software and systems solutions, securely. • Ability to work collaboratively in a small close-knit team and have good communication skills. • Security expertise. Experience building secure code, penetration testing, and reverse engineering malware. • Experience with Windbg, ollydbg, metaspolit, wireshark, burp suite, and other security tools. • MS Visual Studio, XML, XHTML, ASP.NET, C++, J#, etc. • Experience building and securing Enterprise software products. • Have worked in an Agile development environment with Scrum. • Solid understanding of industry best practices for securing systems, secure systems design, security testing, and implementation. Skills: • Software development Reverse Engineering • Application Security • burp suite • information security principles and practices • Malware • metaspolit • ollydbg Yes • optimizing queries • OWASP Top 10 remediation techniques • Penetration Testing • Security - Knowledge in networking, databases, systems and Web operations • Security Information Architecture • SQL Injection attacks • Windbg • Windows - SID • Windows Security - Privileges • Windows Security - Token • Windows Security - ACL • Windows Security - Group Policy • wireshark • IT Security • Active Directory • Information SecuritySecurity Program evaluation • Experience with UNIX, Windows, Linux, MacOS, Cisco, Juniper, web apps, databases, strong authentication, operating systems and network security protocols and procedures. • Network security • Windows • Agile/Scrum Methodology • C/C++ • J# • Visual Studio • XHTML • XML Additional Information Ask IT Consulting Inc.| 33 Peachtree St., Suite 100 |Holtsville, NY 11742 Website: **********************
    $55k-76k yearly est. 60d+ ago
  • Security Analyst - Advanced

    Sunshine Enterprise Usa

    Information security analyst job in Columbia, SC

    Job Title: Security Analyst – Advanced Client\/Agency: State of South Carolina – DSS (Office of Information Technology) Contract Duration: 12 Months (Extension possible) Start Date: 02\/17\/2026 | Deadline 01\/23\/2026 Schedule: 40 hrs\/week | 8:00 AM – 5:00 PM (Day Shift) Interview Process: 1 Round (Microsoft Teams – Video Required) Max Bill Rate: $50\-$53\/hour Work Authorization: Must be eligible to work in the U.S. Residency Requirement: Candidate must be a CURRENT South Carolina resident (No relocation allowed) Security Requirement: Yes Position Overview The State of South Carolina – Department of Social Services (DSS), Office of Information Technology, is seeking a highly skilled Security Analyst – Advanced to support enterprise cybersecurity operations. This role will focus on monitoring, analyzing, and responding to security threats across the environment while supporting detection and response tools such as SIEM, EDR\/XDR, and IDS\/IPS. The ideal candidate will have strong experience in security documentation, Office 365 security administration, scripting\/programming, and working within Red\/Blue Team environments. Key Responsibilities · Monitor, investigate, and respond to security incidents using SIEM, EDR\/XDR, and IDS\/IPS tools. · Perform threat analysis, event correlation, and escalation of security risks and vulnerabilities. · Support incident response activities including triage, containment, remediation, and reporting. · Develop and maintain cybersecurity documentation, procedures, and security playbooks. · Assist with Office 365 Security Administration, including security configurations and monitoring. · Support proactive threat hunting and security improvement initiatives through Red\/Blue Team collaboration. · Build scripts\/tools to improve automation, reporting, and response capabilities using Python, PowerShell, or C\/C++. · Work closely with IT teams to strengthen security posture and implement best practices. Required Skills & Experience · 4+ years of experience with SIEM, EDR\/XDR, and IPS\/IDS · 4+ years of experience creating and maintaining security documentation · 4+ years of experience with C\/C++, Python, or PowerShell · 4+ years of experience working with Red\/Blue Team methodologies · 4+ years of experience with Office 365 Security Administration Preferred Skills · Prior experience as a Security Operations Center (SOC) Security Analyst · SQL\/Scripting experience for reporting and automation Preferred Certifications · CISSP · CSSP · SSCP · CEH Work Location & Residency Requirement · Hybrid schedule: 1 day onsite per week in Columbia, SC · Candidate must be a CURRENT SC resident (No relocation allowed) Sunshine Enterprise USA is an “Equal Opportunity Employer—Minorities, Females, Veterans and Disabled Persons” "}}],"is Mobile":false,"iframe":"true","job Type":"Full time","apply Name":"Apply Now","zsoid":"666380550","FontFamily":"Verdana, Geneva, sans\-serif","job OtherDetails":[{"field Label":"Industry","uitype":2,"value":"Technology"},{"field Label":"Work Experience","uitype":2,"value":"4\-5 years"},{"field Label":"City","uitype":1,"value":"Columbia"},{"field Label":"State\/Province","uitype":1,"value":"South Carolina"},{"field Label":"Zip\/Postal Code","uitype":1,"value":"29620"}],"header Name":"Security Analyst – Advanced","widget Id":"**********00072311","is JobBoard":"false","user Id":"**********00202003","attach Arr":[],"custom Template":"3","is CandidateLoginEnabled":false,"job Id":"**********20750341","FontSize":"12","google IndexUrl":"https:\/\/seu\-usa.zohorecruit.com\/recruit\/ViewJob.na?digest=kJX@DGU@qbph5QFEcbCUnqedJEgmPZSZnE@em.1K4Rg\-&embedsource=Google","location":"Columbia","embedsource":"CareerSite","indeed CallBackUrl":"https:\/\/recruit.zoho.com\/recruit\/JBApplyAuth.do","logo Id":"6zqn0ecd06046e4b149a3a6a61797510edd99"}
    $55k-76k yearly est. 5d ago
  • Security Analyst

    Avani Technology Solutions 3.9company rating

    Information security analyst job in Mount Pleasant, SC

    Job Title : Security Analyst Duration : 12+ Months Job Description: Daily Duties / Responsibilities: 1. Configure, optimize, AND MAINTAIN current security tools to include network and server monitors as well as vulnerability scanners and Intrusion detection. 2. Review firewall reports and create reports of attack methods and their risk to the agency. 3. Create Sit-rep reports for management. 4. Rework our vulnerability scanning tools to better allow us to identify risk. Required Skills: • Nessus vulnerability scanner • Forescout • Configuration and maintenance • Vulnerability analysis and remediation methods • Data classification and management tools • Incident handling experience • SIEM experience - IBM Qradar • Security policy and procedures Required Education: Prefer Bachelor's Degree in Information Technology related discipline with 3 years of experience or minimum 5 years related experience. Required Certifications: Not required but Security certifications will be factored in the selection process Additional Information All your information will be kept confidential according to EEO guidelines.
    $55k-68k yearly est. 60d+ ago
  • IT Analyst

    JHM Hotels 4.6company rating

    Information security analyst job in Greenville, SC

    Title: IT Analyst Department: IT Reports to: Vice President, CTO/CIO Overall Responsibility: To assist in implementing and maintaining IT software and systems and driving business development on existing platforms. Key Areas of Responsibility: · Identify ways to improve current IT infrastructure · Plan and assist on implementation and interfacing of new software · Maintain existing proprietary software · Develop and program in .NET and Sharepoint · Create and maintain SQL databases · Document and map IT systems and processes Terms of Employment: Full-time. Willing to consider contractual basis Qualifications: · Experience in executing project plans · Self-motivated to learn new programs/software · Ability to coordinate amongst different departmental heads · Experience with .NET and SQL Hours: Flexible, but generally our office hours are 8am-5pm and 9am-6pm Pay: Based on experience/qualifications
    $66k-90k yearly est. 60d+ ago
  • IT Security Analyst

    Loop Recruiting

    Information security analyst job in Columbia, SC

    It's fun to work in a company where people truly BELIEVE in what they're doing! We're committed to bringing passion and customer focus to the business. The IT Security Analyst will support the Company's ability to protect the confidentiality, integrity, and availability of its physical and information assets by establishing, monitoring, and enforcing system access controls and security solutions. Responsibilities: Installs, administers, and maintains security software and solutions, including endpoint security, data loss prevention, security event management (SIEM), IPS/IDS, and other security products. Monitors enterprise network for security-related issues and suggests remediation. Responds to requests, provides assistance/technical support, and troubleshoots/resolves problems in a timely manner. Maintains open communication with users regarding questions, problems, project status, and deadlines. Oversees physical security controls, including security badges and camera systems. Reviews security logs daily. Analyzes, responds to, and remediates security incidents or suspicious activity. Qualifications: Associate's degree in a computer-related field or an equivalent combination of education, training, and experience Security+ certification required; CCNA: Security and CySA+ certifications desired. At least two (2) years experience in hands-on IT Security. Experience working with firewalls, SIEMs, IPS/IDS, TCP/IP, anti-virus, end point protection, DLP, Web Proxy, VPN, public key infrastructure, email filtering, and/or encryption solutions preferred.
    $63k-88k yearly est. Auto-Apply 60d+ ago
  • Director IT Security

    New-Indy Containerboard

    Information security analyst job in Catawba, SC

    📦 New-Indy-Where Innovation Meets Opportunity! 🚀 New-Indy is an independent, privately-owned manufacturer and supplier of corrugated boxes, recycled containerboard and virgin linerboard in the industrial packaging industry. Founded as a joint venture between The Kraft Group and Schwarz Partners LP, New-Indy was built on a bold vision-to be the newest independent leader in sustainable packaging solutions. We invest in our people with industry-leading training, career development programs, and growth opportunities designed to build long-term success. If you're a self-starter, passionate about making a difference, and ready to grow with a company that's shaping the future of packaging, we want to hear from you! New-Indy Containerboard (NICB) is seeking a transformational Director, Enterprise Security & Operations responsible for architecting, developing and implementing effective security strategies and protocols to protect the company against threats, theft, vandalism and other information and operational security risks, while directing and overseeing end-user support operations and overall service management to achieve organizational goals. This involves relentless pursuit of operational excellence by seamlessly converging the two critical domains of NICB's IT/OT Infrastructure: Security Operations (SecOps) and IT Operations (ITOps), while routinely conducting risk assessments and benchmarks, identifying vulnerabilities, trends and gaps devising appropriate and reasonable measures to improve NICB's overall security posture, in conjunction with the integration of existing siloed IT support operations across all containerboard mills and packaging plants to improve effectiveness of IT/OT operations services provided on a 24x7x365 basis. This newly created role will be collaborating with all NICB Enterprise IT/OT Teams on architecture and engineering of solutions, hardware and software standards, service portfolios and catalogue's management, defining and governing policies to ensure consistency of security mechanisms and critical process across the organization, such as Asset Management (CMDB, DCIM), Service Management (ITSM), Identity & Access Management to effectively control data's and network's access to employees, contractors, and 3rd party providers across all NICB's IT/OT Infrastructure. To ensure success, the ideal candidate should have in-depth knowledge of complex manufacturing environments, IT & OT landscapes and their convergence, solid experience running IT Operations and Support Teams, and excellent organizational change management skills to enable the integration of these traditional silos. The candidate should be driven to understand all aspects of NICB's businesses and vested in the success of both New-Indy IT and OT in supporting the individual sites, driving risk mitigation and cyber security best practices, and protecting the company's data. Responsibilities - Security • Manage all resources, including leadership support, financial resources, key security personnel and critical partner(s) teams, to support information technology (IT/OT) security goals and objectives and reduce overall organizational risk. • Advise senior management on risk levels and security posture. • Advise appropriate senior leadership or Authorizing Official of changes affecting the organization's cybersecurity posture. • Collect and maintain data needed to meet system cybersecurity reporting (e.g., insurers). • Communicate the value of information technology (IT) and operational technology (OT) security throughout all levels of the organization stakeholders. • Ensure that security improvement actions are evaluated, validated, and deployed as required. • Ensure that cybersecurity inspections, tests, and reviews are coordinated for the network environment. • Ensure that cybersecurity requirements are integrated into the continuity planning for that system and/or organization(s). • Evaluate and approve development efforts to ensure that baseline security safeguards are appropriately installed. • Identify alternative information security strategies to address organizational security goals. • Identify information and operational technology (IT/OT) security program implications of new technologies or technology upgrades. • Interpret patterns of noncompliance to determine their impact on levels of risk and/or overall effectiveness of the enterprise's cybersecurity program. • Manage the monitoring of information security data sources to maintain organizational situational awareness. • Oversee the information security training and awareness program. • Lead information & network security risk assessments. • Lead the development or modification of the computer environment cybersecurity program plans and requirements. • Prepare, distribute, and maintain plans, instructions, guidance, and standard operating procedures concerning the security of network system(s) operations. • Provide system-related input on cybersecurity requirements to be included in statements of work and other appropriate procurement documents. • Recognize a possible security violation and take appropriate action to report the incident, as required. • Recommend resource allocations required to securely operate and maintain an organization's cybersecurity requirements. • Supervise or manage protective or corrective measures when a cybersecurity incident or vulnerability is discovered. • Track audit findings and recommendations to ensure that appropriate mitigation actions are taken. • Promote awareness of security issues among management and ensure sound security principles are reflected in the organization's vision and goals. • Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies. • Identify security requirements specific to an information or operational technology (IT/OT) system in all phases of the system life cycle. • Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc. • Assure successful implementation and functionality of security requirements and appropriate information and operational technologies (IT/OT) policies and procedures that are consistent with the organization's mission and goals. • Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs). • Continuously validate the organization against policies, guidelines, procedures, regulations, and laws to ensure compliance. Responsibilities - Operations • Manage all resources, including leadership support, financial resources, key help-desk personnel and critical partner(s) teams, to support information technology operations and service management goals and objectives for the Enterprise IT/OT Teams. • Oversee regular patching schedules for IT systems to ensure that vulnerabilities are identified and remediated swiftly. • Direct daily operations of the service desk, ensuring prompt and effective handling of support requests and SLA compliance. • Lead and mentor the support staff, fostering a collaborative atmosphere and encouraging professional growth. • Formulate and implement a technical strategy that aligns with the organization's goals and enhances service delivery. • Evaluate and manage the tools and systems utilized by the support team, including ticketing software and self-service platforms. • Analyze key performance indicators (KPIs) and service level agreements (SLAs) such as First Time Resolutions, Resolution Time, Customer Satisfaction, Ticket Volume, among others to identify and act on areas for improvement. • Deliver high-quality technical assistance to both customers and internal users, ensuring issues are resolved efficiently. • Organize training sessions to enhance team members' technical skills and customer service capabilities. • Coordinating with other IT/OT departments to understand their needs and address any issues that may affect their operations. This cross-departmental collaboration is vital to ensure that all parts of the organization are supported adequately by IT/OT services. • Maintaining IT/OT documentation, ensuring that all processes, configurations, and procedures are documented thoroughly. • Develop IT/OT Support Policies & SOPs - Standard Operating Procedures. Qualifications Core Competencies: • Cybersecurity, Vulnerabilities Assessment & Threat Analysis • Enterprise Architecture & Business Continuity • Information & Operational (IT/OT) Systems/Network SecurityInformation & Operational Technology (IT/OT) Assessment • IT/OT Infrastructure, Network & Operations Management • Operating Systems & Database Administration • Policy & Risk Management • SOC/IR Management • ITSM - IT Service Management & ITIL - IT Infrastructure Library • Vendor & Contract Management • Customer Service Management Core Knowledge: • Knowledge of data backup, resilience and recovery. • Knowledge of business continuity and disaster recovery continuity of operations plans. • Knowledge of intrusion detection methodologies and techniques for detecting host, network-based intrusions, and of current and emerging threats/threat vectors. • Knowledge of controls related to the use, processing, storage, and transmission of data. • Knowledge of encryption algorithms. • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). • Knowledge of measures or indicators of system performance and availability. • Knowledge of network traffic analysis methods, and tools. • Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. • Knowledge of server and client operating systems. • Skill in creating policies that reflect system security objectives. • Knowledge of new and emerging information and operational technologies (IT/OT) and cybersecurity technologies. • Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins). • Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities. • Knowledge of penetration testing principles, tools, and techniques. Other Skills & Qualifications: • Bachelors in relevant science and engineering technology fields, business, or commensurate equivalent work experience. • Organizational skills, attention to detail, follow up, documentation preparation and maintenance skills, and customer service orientation are crucial for success in this role. • Exceptional interpersonal skills, with a focus on rapport-building, listening, conflict resolution and questioning. • Experience in managing cross-functional teams and processes. • Exceptional written and oral communication skills. • Ability to conduct research into a wide range of issues as required. • Ability to absorb and retain information quickly. • Ability to present ideas in user-friendly language. • Highly self-motivated and directed. • Proven analytical and problem-solving abilities. • Ability to effectively prioritize and execute tasks in a high-pressure environment. • Experience working in a team-oriented, collaborative environment. • Reliable and available to work a flexible schedule including nights and weekends. Work Conditions: • 40-hour on-site work week. Emergency call-in availability for 24-hour production environment. • Ability to work on-site at industrial facilities, which may include working in hazardous environments or under strict safety protocols. • Dexterity of hands and fingers to operate a computer keyboard, mouse, power tools, and other computer components. Be able to lift 40 lbs. unassisted. • Physically able to participate in sessions, presentations, and meetings. • Some travel may be required for the purpose of offsite software and system integration efforts, and team building and development activities.
    $92k-140k yearly est. 11d ago
  • IT Financial Analyst

    Cayuse Holdings

    Information security analyst job in Columbia, SC

    **JOB TITLE:** IT Financial Analyst **CAYUSE COMPANY:** Cayuse Commercial Services, LLC **SALARY:** $28.00-$35.00/hr **EMPLOYEE TYPE:** Full-Time Hourly Non-Exempt **The Work** The IT Financial Analyst will provide day-to-day support for invoice review and approval processing. The role will also assist IT managers with other financial tasks as assigned. This position performs all duties and responsibilities in accordance with the Mission, Vision, and Core Values of Cayuse. **Responsibilities** **Key Responsibilities** + Monitor vendor invoice mailbox + Review vendor invoices + Match against contract or purchase order + Verify invoice for payment or return to vendor + Record invoice in general ledger + Notify Accounts Payable for vendor payment + Work with IT managers on other financial tasks as assigned + Respond to assigned tasks in accordance with predefined guidelines. + Other duties as assigned. **Qualifications** **Qualifications - Here's What You Need** + High school diploma or equivalent required + Two (2) to five (5) years of experience working in a finance position with focus on billing, invoicing, vendor management. + Preference with experience supporting an IT organization + Must be able to pass a background check. May require additional background checks as required by projects and/or clients at any time during employment. **Minimum Skills:** + Microsoft Office experience (Work, Excel) + Experience with JD Edwards preferred + Financial billing, accounts payable experience + General accounting + Excellent communication skills + Experience working with suppliers and third-party vendors + Ability to quickly analyze a situation and react appropriately and effectively + Effective prioritization skills + Self-starter + Financial analysis credibility and independent judgment + Able to contribute to IT financial planning and operations **Our Commitment to you / overview of benefits** + Medical, Dental and Vision Insurance; Wellness Program + Flexible Spending Accounts (Healthcare, Dependent Care, Commuter) + Short-Term and Long-Term Disability options + Basic Life and AD&D Insurance (Company Provided) + Voluntary Life and AD&D options + 401(k) Retirement Savings Plan with matching after one year + Paid Time Off **Reports to:** **Program Manager** **Working Conditions** + Professional remote office environment. + Must reside in Central or Eastern Time Zone. + Must be physically and mentally able to perform duties extended periods of time. + Ability to use a computer and other office productivity tools with sufficient speed to meet the demands of this position. + Must be able to establish a productive and professional workspace. + Must be able to sit for long periods of time looking at computer screen. + May be asked to work a flexible schedule which may include holidays. + May be asked to travel for business or professional development purposes. + May be asked to work hours outside of normal business hours. **Other Duties:** _Please note this job description is not designed to cover or contain a comprehensive list of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice._ **_Cayuse is an Equal Opportunity Employer. All employment decisions are based on merit, qualifications, skills, and abilities. All qualified applicants will receive consideration for employment in accordance with any applicable federal, state, or local law._** **Pay Range** USD $28.00 - USD $35.00 /Hr. Submit a Referral (********************************************************************************************************************************* **Can't find the right opportunity?** Join our Talent Community (********************************************************** or Language Services Talent Community (******************************************************** and be among the first to discover exciting new possibilities! **Location** _US-_ **ID** _103881_ **Category** _Accounting/Finance_ **Position Type** _Full-Time Hourly Non Exempt_ **Remote** _Yes_ **Clearance Required** _None_
    $28-35 hourly 10d ago
  • AFCENT NOSC - IT Policy Analyst

    Sms Data Products Group

    Information security analyst job in Sumter, SC

    As a dynamic systems integrator, SMS offers proven solutions in engineering, operations, cybersecurity, and digital transformation. With expertise in modernizing and optimizing legacy infrastructure and systems, ensuring operational efficiency, and designing, implementing, and managing secure environments, SMS supports business and mission goals with proficiency, quality, and integrity. SMS has been serving the advanced information technology needs of the federal government since 1976, delivering talented teams and innovative, cost-effective solutions and services to support our customers' missions for more than 45 years. SMS is headquartered in McLean, Virginia, with offices and on-site operations at customer locations throughout the United States. For additional information on SMS, visit ************ Submit your resume today! Responsibilities Provide support to leadership for analysis and development of DoD information technology, cybersecurity, and data policy, processes, and standards. Interpret and analyze existing and new DoD and U.S. Government policy for applicability and alignment to the AFCENT mission. Author specific policy documentation and memorandum applicable to AFCENT A6 mission. Synthesize complex policy and technical matters into clear, effective policy documents written in accordance with U.S. Government “plain language” requirements. Coordinate formal and informal stakeholder review and revision of AFCENT A6 policy documentation and memorandum. Participate, support, and represent AFCENT A6 in internal and external policy working groups and meetings. Provide recommendations to AFCENT A6 customer on new and improved policy artifacts to improve mission enablement and delivery. Establish and maintain a repository of policy documentation and memorandum and develop processes for sharing new and updated information with supported units. Train NOSC personnel on the new and updated policies and memorandums as applicable. Prepare briefings and reports to AFCENT leadership on policy development or major revisions. Qualifications Qualifications B.S. in related field and 5 or more years' relevant experience Or 7 or more years' relevant experience Secret clearance level required Certifications ITIL Foundation (candidate has up to 60 days to acquire ITIL Foundation certification) SMS is a dynamic systems integrator established in 1976, delivering talented teams and innovative, cost-effective solutions and services to support our customers' missions for more than 47 years. Our ability to hire and retain quality people in a rapidly evolving IT market is proven through our employee retention rate averaging over 3 years. At SMS, we place a high value on quality of service, customer satisfaction, and best-of-breed policies and practices, resulting in CMMI Level 3 certification and ISO registrations including 9001:2015, 20000-1:2018, and ISO/IEC 27001:2013. SMS is headquartered in McLean, Virginia, with offices and on-site operations at customer locations throughout the United States. SMS is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
    $63k-88k yearly est. Auto-Apply 46d ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Charleston, SC?

The average information security analyst in Charleston, SC earns between $55,000 and $107,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Charleston, SC

$77,000
Job type you want
Full Time
Part Time
Internship
Temporary