Post job

Information security analyst jobs in Forest Acres, SC

- 100 jobs
All
Information Security Analyst
Security Engineer
Security Architect
Securities Analyst
Information Technology Analyst
Information Systems Security Officer
Information Security Engineer
Information Systems Engineer
Information Systems Security Manager
Senior Security Engineer
Certified Information Systems Security Professional
Senior Security Analyst
Information Assurance
Information Assurance Analyst
Information Security Manager
  • Security Analyst

    Intersources Inc.

    Information security analyst job in Columbia, SC

    Title: Security Analyst - Project Lead (8780) Work Mode: Hybrid (3 days onsite per week required) Contract Duration: 12 months (Extension possible) Interview Process: 1 round, virtual video interview required Candidate Requirement: Candidate must be a current South Carolina resident. No relocation allowed. Scope of Work The resource will plan, coordinate, evaluate, document, and report on IRS Pub 1075 compliance activities, including security controls, corrective action plans (CAPs), artifacts, SCSEM requirements, and follow-up remediation. Key Responsibilities • Lead, coordinate, and support preparation efforts for an IRS Safeguard Review. • Review Corrective Action Plans (CAPs) for effectiveness and determine compliance readiness. • Review SSR, SSPs, and SSAs to ensure alignment with IRS Publication 1075. • Identify relevant IRS Safeguard Computer Security Evaluation Matrix (SCSEM) controls and assess agency compliance. • Provide technical advice for remediation of non-compliant SCSEM control areas. • Assist and coordinate follow-up actions after the Safeguard Review, including CAP development for findings. • Provide expert analysis of proposed technical solutions to ensure compliance with IRS Pub 1075. • Conduct research and recommend security improvements for systems and infrastructure. • Use the agency's established project management methods for planning, coordination, communication, and reporting. • Communicate effectively with both technical and non-technical staff, including federal and state stakeholders and executive leadership. Required Skills (Must Have) • 5+ years of expert-level experience as a Security Analyst, including risk assessment, vulnerability management, and incident response. • 3+ years of experience preparing for and actively supporting at least one IRS Safeguard Review at a state agency. • 3+ years of experience working with and applying IRS SCSEM requirements including implementation, compliance assessment, and documentation. • 3+ years of experience with IRS Publication 1075 (Rev. 11-2021) compliance. • Strong proficiency with Microsoft Office, SharePoint, and Microsoft Teams. • Excellent oral and written communication skills across multidisciplinary teams. • Knowledge of applicable IT security standards (e.g., ISO, IEEE). Preferred Skills • Experience with Child Support Enforcement systems or knowledge of Child Support program operations and objectives. • Experience with federal or state regulatory compliance frameworks such as FISMA, NIST, or IRS Publication 1075. • Experience developing and maintaining technical documentation and audit support for safeguard reviews, security audits, and compliance assessments.
    $55k-76k yearly est. 3d ago
  • Manager Information Security & Risk Management - Cloud Security Manager

    Highmark Health 4.5company rating

    Information security analyst job in Columbia, SC

    This job provides Information Security and Risk Management services for the Organization. Works with peers within security, HM Health Solutions customers and application teams to ensure alignment with current and future security needs. Manages activities of various Information Security personnel. Makes decisions on personnel actions (promotions, hiring, terminations, etc.). Develops talent, addresses resource management, cultivates capabilities of staff, planning and coordination of work, and managing performance. Conducts the oversight of security technology products for network, systems, and data. Controls expenses within the operating unit and is responsible for meeting budget goals. Actively contributes to the Information Security ans Risk Management (ISRM) strategic planning process by working with the Directors to develop and implement department strategic plans and action steps that support the corporate strategic objectives. Actively involved in the coordination, implementation, problem solving, communication, and training of new technologies and processes, as they are developed and moved into the environment. Develops and presents Information Security awareness and training programs. **ESSENTIAL RESPONSIBILITIES** + Perform management responsibilities including, but not limited to: involved in hiring and termination decisions; coaching and development; rewards and recognition; performance management and staff productivity. + Plan, organize, staff, direct and control the day-to-day operations of the department; develop and implement policies and programs as necessary; may have budgetary responsibility and authority. + Provide oversight of all aspects of project management to ensure continuous improvement of processes: negotiate and collaborate with leadership and staff to develop security solutions and options; develop and adhere to internal standards and strategies; ensure adherence to approved methodologies; coordinate resources, time, contingency plans and risk management. + Provide leadership to the department: lead and champion organizational change; encourage participation in activities that support relationship development; champion information security innovation; encourage and enforce proper training in regards to security issues. + Ensure compliance to Corporate and Information Security policies, standards and procedures. + Communicate effectively with all levels of the organization: facilitate meetings; plan, design and provide presentations; represent HM Health Solutions with outside entities; prepare divisional procedures, policies, reports and correspondence; spread awareness of new and existing security threats; provide oversight regarding metrics, funding, budgets and resources. + Other duties as assigned or requested. **EDUCATION** **Required** + Bachelor's Degree in Information Security, Information Systems, Information Assurance, Computer Science or related field **Substitutions** + 6 years of relevant experience substitution for a Bachelor's Degree **Preferred** + Master's Degree in Computer Science, Information Security or related field **EXPERIENCE** **Required** + 7 - 10 years in Information Security and/or Information Risk Management and/or Information Technology + 7 - 10 years in developing, communicating and presenting Information Security and Risk Management concepts to varying audiences + 1 - 3 years in mentoring others in a leadership role + 1 - 3 years in Staff Management + 1 - 3 years in developing and executing strategic plans to realize business objectives **Preferred** + 10 - 15 years in Information Security and/or Information Risk Management and/or Information Technology + Experience managing an information security function using the HITRUST Common Security Framework (HITRUST CSF), or the NIST 800-83 cyber security framework + Experience supporting SSAE 16 or SOC 2 Security Trust Principle audits + Experience establishing budgets and meeting fiduciary goals + Security industry organization participation/leadership (HITRUST, ISACA, InfraGard, ISC2, ISSA, etc.) **LICENSES AND CERTIFICATIONS** **Required** + None **Preferred** + Certified Information Systems Security Professional (CISSP) **OR** + Certified Information Security Manager (CISM) **OR** + Certified in Risk and Information Systems Controls (CRISC) **OR** + Information Technology Infrastructure Library (ITIL) **SKILLS** + Knowledge of regulatory requirements such as Health Insurance Portability and Accountability Act (HIPPA), Payment Card Industry Data Security Standards (PCI DSS), and FIPS-140 + Strong teamwork and interpersonal skills + Experience in leading process improvement initiatives + Ability to motivate high performance, multi-discipline teams + Demonstrated competency in project execution + Demonstrated abilities in relationship management **Languages (Other than English)** None **Travel Requirement** 0% - 25% **PHYSICAL, MENTAL DEMANDS and WORKING CONDITIONS** **Position Type** Office-Based Teaches/Trains others regularly Frequently Travels regularly from the office to various work sites or from site-to-site Occasionally Works primarily out-of-the office selling products/services (Sales employees) Does Not Apply Physical Work Site Required Yes Lifting: up to 10 pounds Does Not Apply Lifting: 10 to 25 pounds Does Not Apply Lifting: 25 to 50 pounds Does Not Apply **_Disclaimer:_** _The job description has been designed to indicate the general nature and essential duties and responsibilities of work performed by employees within this job title. It may not contain a comprehensive inventory of all duties, responsibilities, and qualifications required of employees to do this job._ **_Compliance Requirement_** _: This job adheres to the ethical and legal standards and behavioral expectations as set forth in the code of business conduct and company policies._ _As a component of job responsibilities, employees may have access to covered information, cardholder data, or other confidential customer information that must be protected at all times. In connection with this, all employees must comply with both the Health Insurance Portability Accountability Act of 1996 (HIPAA) as described in the Notice of Privacy Practices and Privacy Policies and Procedures as well as all data security guidelines established within the Company's Handbook of Privacy Policies and Practices and Information Security Policy._ _Furthermore, it is every employee's responsibility to comply with the company's Code of Business Conduct. This includes but is not limited to adherence to applicable federal and state laws, rules, and regulations as well as company policies and training requirements._ **Pay Range Minimum:** $108,000.00 **Pay Range Maximum:** $201,800.00 _Base pay is determined by a variety of factors including a candidate's qualifications, experience, and expected contributions, as well as internal peer equity, market, and business considerations. The displayed salary range does not reflect any geographic differential Highmark may apply for certain locations based upon comparative markets._ Highmark Health and its affiliates prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on any category protected by applicable federal, state, or local law. We endeavor to make this site accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact the email below. For accommodation requests, please contact HR Services Online at ***************************** California Consumer Privacy Act Employees, Contractors, and Applicants Notice Req ID: J269753
    $108k-201.8k yearly 60d+ ago
  • Senior Analyst, Security Compliance (SOX IT)

    Coinbase 4.2company rating

    Information security analyst job in Columbia, SC

    Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system. To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems. Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be. While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported. Coinbase stores more digital currency than any company in the world, making us a top tier target on the internet. Security is core to our mission and has been a key competitive differentiator for us as we scale worldwide. Essential to scaling is building and running a security compliance program that reflects how we protect the data and assets in our care, to open the doors with customers, regulators, auditors, and other external stakeholders. If you love working with fast moving companies to grow and scale security compliance engines and create positive change across the business, we'd like to speak with you about joining our team. Coinbase is looking for a Security Compliance Senior Analyst to drive the second line of defense IT SOX initiatives and help mature the IT SOX program. *What you'll be doing (ie. job duties):* * Lead Security and IT initiatives to support the SOX roadmap and advance program maturity * Assist with SOX planning activities, including scoping of IT systems and creating training material to owners in preparation for SOX audit * Lead security control gap assessments over SOX control environment, recommend remediation plans and track through completion * Assess SOX implications of new products, update relevant controls, and communicate requirements to product organization and other stakeholders * Provide ongoing reporting to stakeholders and leadership on above responsibilities and communicate progress and escalations management * Perform SOX audit and control impact analysis as a result of security and technology incidents and partner with owning teams on control uplift activities * Build close relationships with stakeholder teams including Security, IT, Infrastructure, Engineering, Data, and Finance to advise on SOX requirements and ensure excellence in control ownership * Create and improve SOX procedural documentation, including process documentation, data flow diagrams, and uplifting templates * Work closely with internal and external auditors to educate them about a complex technology control environment * Oversee quality of audit initiatives, identify and analyze process gaps, provide guidance and expertise to team members * Develop creative solutions to prove risk mitigation and solve for complex audit problems faced by the crypto industry * Identify opportunities to address systemic program challenges, recommend solutions and drive efficiency through AI and automation *What we look for in you (ie. job requirements):* * Minimum of 5+ years of security/IT compliance or equivalent experience * Strong knowledge and hands-on experience in Internal Controls over Financial Reporting, SOX 404 frameworks, and testing to support compliance * Prior experience at a big 4 accounting firm * Experience leading compliance initiatives from start to finish * Proven understanding and audit experience of cloud technologies, AWS preferred * Ability to effectively and autonomously accomplish outcomes across cross-functional teams in ambiguous situations with minimal supervision * Strong oral and written communication skills * Ability to multitask, direct cross functional work, and hold others accountable to committed deadlines in a fast paced environment * Ability to communicate with technical / non-technical stakeholders to align on shared outcomes * Experience in Financial services, Big Tech, or FinTech *Nice to haves:* * BA or BS in a technical field or equivalent experience * Security certifications e.g. CISA, CISSP, CISM or other relevant certifications * Experience auditing in Crypto space Position ID: P73675 \#LI-Remote *Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)). Pay Range: $167,280-$196,800 USD Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying. Commitment to Equal Opportunity Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law. Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations*********************************** *Global Data Privacy Notice for Job Candidates and Applicants* Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required. *AI Disclosure* For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description. For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate. *The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
    $167.3k-196.8k yearly 60d+ ago
  • Security Architect

    Oracle 4.6company rating

    Information security analyst job in Columbia, SC

    As a Product Security architect, you will be performing security reviews and providing hands-on help to development teams to address security issues systematically. We're looking for passionate engineer who is able to consider business impact and risk to Oracle and its customers while dealing with any security issues. You will work a trusted partner with one or more SaaS product development teams, while simultaneously collaborating with your peers in evolving or creating new security patterns or standards to address any security issues/gaps in an efficient way. You will research the product security landscape and help steer product security architecture for solutions that will provide a competitive edge for Oracle SaaS. This position requires strong product security and application security experience. It will be highly valuable to have past experience in working in or with product development teams. **Responsibilities** **Key responsibilities:** + Evaluate existing and proposed SaaS Service architectures and perform security architecture reviews, threat modeling, risk assessment and provide guidance on mitigating the security risks. + Partner and collaborate with development teams for SaaS products and provide security expertise to product design conversations and implementation decisions. + Work with product teams and peers in security operations to analyze and triage security issues in production and deploy any mitigation such as WAF policies + Review and assess security posture and CVEs in third party libraries or products. + May perform source code review for vulnerability fixes by development teams. + Keep up to date on emerging threats and standards and translate into actionable guidance including but not limited to crypto, AI Security, Identity, Web security, multi-tenant deployment + Evolve security processes and integrate security architecture into SDLC leveraging AI and automation, as appropriate. + Engage in technical discussions, as needed and serve as a subject matter expert for security architecture and trusted advisor to executive leadership and key stakeholders. + Define and influence secure-by-design architecture standards, security patterns, and reference implementations for SaaS Services + May train and mentor team members **Qualifications:** + 7+ years of information security experience including product security, application security, security testing/offensive security, security tools and security architecture. + Experience in helping or leading a product security architecture and assurance effort in a large-scale IaaS/PaaS/SaaS Cloud Service Provider, or Fortune 500 company. + Expert knowledge of modern vulnerability types and threats including intelligence, discovery, mitigation, remediation, and root cause. + Understanding of security risks in AI based solutions including AI Agents, MCP, Generative AI and ML. + Hands-on experience with at-least one programming languages such as Java, Python. + Hands-on experience and knowledge of product development lifecycle in a large enterprise software company. + Understanding of industry standard frameworks such as OWASP, MITRE, NIST, PCI, FedRAMP, etc. + Ability to guide and engage individuals and development teams located across multiple geographies and or cultures. + Knowledge of Oracle Cloud Infrastructure or Oracle SaaS Services is a plus. + Excellent written and verbal communication skills, strong analytical and problem-solving skills. Disclaimer: **Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.** **Range and benefit information provided in this posting are specific to the stated locations only** US: Hiring Range in USD from: $96,800 to $251,600 per annum. May be eligible for bonus, equity, and compensation deferral. Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle's differing products, industries and lines of business. Candidates are typically placed into the range based on the preceding factors as well as internal peer equity. Oracle US offers a comprehensive benefits package which includes the following: 1. Medical, dental, and vision insurance, including expert medical opinion 2. Short term disability and long term disability 3. Life insurance and AD&D 4. Supplemental life insurance (Employee/Spouse/Child) 5. Health care and dependent care Flexible Spending Accounts 6. Pre-tax commuter and parking benefits 7. 401(k) Savings and Investment Plan with company match 8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation. 9. 11 paid holidays 10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours. 11. Paid parental leave 12. Adoption assistance 13. Employee Stock Purchase Plan 14. Financial planning and group legal 15. Voluntary benefits including auto, homeowner and pet insurance The role will generally accept applications for at least three calendar days from the posting date or as long as the job remains posted. Career Level - IC5 **About Us** As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all. Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs. We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_************* or by calling *************** in the United States. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
    $96.8k-251.6k yearly 58d ago
  • Detection & Response Security Engineer, Threat Intelligence

    Meta 4.8company rating

    Information security analyst job in Columbia, SC

    Meta Security is looking for a threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture. You will help the team establish, lead and execute multi-year roadmaps that improve research efficiency and quality across the team, and drive improvements to stakeholder management across a broad range of intelligence requirements. **Required Skills:** Detection & Response Security Engineer, Threat Intelligence Responsibilities: 1. Influence and align the team's vision and strategy. Collaboratively prioritize and deliver specific multi-year roadmaps and projects 2. Build, cultivate, and maintain impactful relationships with intelligence stakeholders to identify and facilitate solutions to increase the impact of the team's work 3. Refine operational metrics, key performance indicators, and service level objectives to measure Intelligence research and services 4. Lead cross-functional projects to improve the security posture of Meta's infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions 5. Track threat clusters posing threats to Meta's infrastructure and employees, and identify, develop and implement countermeasures on our corporate network 6. Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences 7. Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations 8. Improve the tooling of threat cluster tracking and intelligence data integration to existing systems **Minimum Qualifications:** Minimum Qualifications: 9. 8+ years threat intelligence experience 10. B.S. or M.S. in Computer Science or related field, or equivalent experience 11. Be a technical and process subject matter expert regarding Security Operations and Threat Intelligence services 12. Experience developing and delivering information on threats, incidents and program status for leadership 13. Expertise with campaign tracking techniques and converting tracking results to long term countermeasures 14. Expertise with threat modeling frameworks, such as Diamond Model or/and MITRE ATT&CK framework 15. Experience intelligence-driven hunting to spot suspicious activities in the network and identify potential risks 16. Proven track record of managing and executing on short term and long term projects 17. Ability to work with a team spanning multiple locations/time zones 18. Ability to prioritize and execute tasks with minimal direction or oversight 19. Ability to think critically and qualify assessments with solid communications skills 20. Coding or scripting experience in one or more scripting languages such as Python or PHP **Preferred Qualifications:** Preferred Qualifications: 21. Experience recruiting, building, and leading technical teams, including performance management 22. Experience close collaborating with incident responders on incident investigations 23. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and systems 24. Familiarity with malware analysis or network traffic analysis 25. Familiarity with nation-state, sophisticated criminal, or supply chain threats 26. Familiarity with file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort 27. Experience in one or more query languages such as SQL 28. Experience authoring production code for threat intelligence tooling 29. Experience conducting large scale data analysis 30. Experience working across the broader security community **Public Compensation:** $177,000/year to $251,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $177k-251k yearly 57d ago
  • Information Assurance Analyst

    Infojini 3.7company rating

    Information security analyst job in Columbia, SC

    SCOPE OF THE PROJECT: The SCDHHS Office of Information Assurance (OIA) is charged with ensuring the security and compliance of SCDHHS' information systems and data. OIA seeks experienced consultants to assist with the establishment, implementation, and/or enhancement of information system security and compliance efforts based on Federal, State, and Agency regulatory requirements, policies, standards, and guidelines. Role Summary/Purpose Overview: The IA Analyst will report to the Office of Information Assurance and operate as an experienced information assurance consultant to SCDHHS leadership, business units, business partners, vendors, and other stakeholders. Security Program Experience: Demonstrated work experience and high degree of familiarity with FISMA or NIST Risk Management Framework-based programs is required. Experience and knowledge of MARS-E is preferred. This experience should include documented success in the creation and maintenance of Risk Management Framework (RMF) and Assessment and Authorization (A&A) artifacts such as System Security Plans, Privacy Impact Assessments, Interconnection Security Agreements, Computer Matching Agreements, and Plans of Action and Milestones. Such experience will necessarily require excellent communication skills with the ability to interview staff and vendors, to review and analyze existing documentation and diagrams, and to create or collect other required supporting documents as appropriate. Experience with integrating RMF and A&A tasks into the System Development Life Cycle (SDLC) is preferred. Experience in security as related to Cloud services and vendor management is desirable for this position. Technical Knowledge: Although this is not a technical position, suitable candidates will have a good working knowledge of a broad range of information technologies such as IBM System 390/zSeries, Linux and Windows servers, database management systems, firewalls, IPS solutions, switching and routing infrastructure, data types and data classifications, and related information technologies and concepts. General Duties and Responsibilities: 1. Assist in the development, implementation, and/or ongoing maturation of SCDHHS security and compliance initiatives. 2. Audit and assess internal agency systems as well as business partner, service provider, and vendor information system security controls. 3. Utilize the Microsoft Office software suite, eGRC system, Bizagi, Atlassian, and other products to document and report on information gathered during audit and assessment activities or other OIA efforts. 4. Participate in third-party audits and/or assessments of agency and business partner systems. 5. Collaborate with agency leadership, business partners, and other parties/stakeholders to provide recommendations for security and compliance risk mitigation efforts. REQUIRED CERTIFICATION: ISC(2), ISACA, SANS GIAC, or other similar Information Security Certification is required. EDUCATION PREFERRED: Bachelor's degree in computer science or similar discipline is preferred. 1. Strong working knowledge of FISMA, NIST, and HIPAA Security and Privacy requirements, standards, and guidelines. 2. 5+ years of experience working in the Information Technology field or auditing Information Technology systems or programs. 3. ISC(2), ISACA, SANS GIAC, or other similar Information Security Certification is required. 4. Documented experience in the creation and maintenance of Risk Management Framework (RMF) and Assessment and Authorization (A&A) artifacts such as System Security Plans, Privacy Impact Assessments, Interconnection Security Agreements, Computer Matching Agreements, and Plans of Action and Milestones. 5. Ability to work independently and as a member of a team. 6. Ability to multitask and prioritize tasks effectively in order to meet deadlines. 7. Ability to engage diverse audiences of varying technical and non-technical skill-levels to ensure effective alignment of technical requirements to business objectives. 8. Ability to collaborate and coordinate efforts among multiple teams and vendors. 9. Must have intermediate to advanced skills in Microsoft Office products (Word, Excel, PowerPoint, Visio) to include working with templates and style guidelines for branding consistency. 10. Keen attention to detail while maintaining the ability to see the big picture. 11. Ability to absorb, retain, and communicate complex processes. 12. Strong English language skills. 13. Demonstrable understanding of the rules of English grammar and usage. 14. Ability to accept changes and constructive criticism and to remain flexible in dealing with leadership and teams of varying technical and business knowledge. Preferred Requirements/Skills: 1. Bachelor's degree in computer science or similar discipline. 2. Strong working knowledge of CMS MARS-E compliance requirements. 3. Prior experience working with an organization subject to CMS MARS-E requirements. 4. Experience and training with eGRC solutions. 5. Prior Health Information Technology experience. 6. Previous Medicaid experience. 7. Understanding of LEAN and Agile development practices. Additional Information All your information will be kept confidential according to EEO guidelines.
    $53k-70k yearly est. 60d+ ago
  • Field Chief Information Security Officer

    Shi 4.7company rating

    Information security analyst job in Columbia, SC

    **About Us** **Since 1989, SHI International Corp. has helped organizations change the world through technology. We've grown every year since, and today we're proud to be a $16 billion global provider of IT solutions and services.** **Over 17,000 organizations worldwide rely on SHI's concierge approach to help them solve what's next. But the heartbeat of SHI is our employees - all 7,000 of them. If you join our team, you'll enjoy:** + **Our commitment to diversity, as the largest minority- and woman-owned enterprise in the U.S.** + **Continuous professional growth and leadership opportunities.** + **Health, wellness, and financial benefits to offer peace of mind to you and your family.** + **World-class facilities and the technology you need to thrive - in our offices or yours.** **Job Summary** The Chief Information Security Officer will develop and implement a comprehensive information security strategy that aligns with the organization's goals, ensuring the protection of information assets through effective policy enforcement and risk management. This role involves managing incident response, ensuring regulatory compliance, and overseeing security audits and technology investments to enhance the organization's security posture. The CISO will collaborate with various departments, conduct security awareness training, and provide regular updates to senior management and the board on security status, risks, and initiatives. **Role Description** + Develop and implement an information security strategy that aligns with the organization's goals and objectives to ensure comprehensive protection of information assets. + Oversee the development and enforcement of security policies to ensure that all security policies, procedures, and protocols are up-to-date and effectively implemented across the organization. + Lead risk management efforts by identifying, assessing, and mitigating information security risks to protect the organization from potential threats and vulnerabilities. + Manage incident response and recovery by developing and overseeing the execution of incident response plans to address security breaches and ensure timely recovery. + Ensure compliance with regulatory requirements by monitoring and enforcing compliance with relevant laws, regulations, and industry standards related to information security. + Collaborate with other departments such as IT, legal, HR, and others to integrate security measures into all aspects of the organization's operations. + Conduct security awareness training to educate employees on security best practices and promote a culture of security awareness throughout the organization. + Oversee security audits and assessments by regularly conducting internal and external audits to evaluate the effectiveness of security measures and identify areas for improvement. + Manage security technology investments by evaluating, selecting, and implementing security technologies and tools to enhance the organization's security posture. + Report to senior management and the board of directors by providing regular updates on the organization's security status, risks, and initiatives to ensure informed decision-making at the highest levels. **Behaviors and Competencies** + Technical Expertise: Can create new applications for technical knowledge and skills and can lead the development of technical standards and procedures. + Strategic Thinking: Can analyze complex situations, drive organizational transformation, and adapt strategies to changing market conditions. + Risk-Taking: Can inspire and encourage others to take calculated risks, fostering a culture of innovation and adaptability. + Decision-Making: Can lead organizational decision-making, mentor others in developing decision-making skills, and create frameworks that enhance the decision-making capabilities of the team. + Leadership: Can lead strategic team initiatives, inspire others to take leadership roles, and foster a culture of shared responsibility and continuous improvement. + Analytical Thinking: Can lead and innovate in the application of analytical thinking, solve complex problems, influence others, and contribute to best practices. + Communication: Can lead and model exceptional communication at all levels of the organization, develop and implement communication strategies, and coach others to improve their communication skills. + Adaptability: Can drive strategic transformations, inspire others to embrace change, and foster a culture of continuous adaptation. + Collaboration: Can lead complex team projects, inspire others to collaborate effectively, and foster a culture of mutual respect and shared purpose. + Ethics: Can lead strategic initiatives, inspire others to uphold ethical standards, and foster a culture of integrity and ethical conduct. **Skill Level Requirements** + Deep understanding of the security industry, best practices, emerging technologies, and leading solutions - Expert + Experience supporting various compliance and regulatory frameworks - Expert + Change Management, ability to manage, drive, and adapt to organizational change while maintaining team morale and productivity. - Expert + Continuous Improvement, identifying areas for improvement, implementing changes, and measuring results to enhance processes and performance. - Expert + Financial Awareness and understanding of financial concepts, budgeting, with the ability to make informed decisions based on financial data. - Expert + Forward Thinking, anticipating future trends and needs, and making decisions that position oneself or one's organization for success. - Expert + Innovation to generate, develop, and implement new and original ideas, challenging the status quo to improve processes and solutions. - Expert + Resilient, has the ability to recover quickly from difficulties and adapt in the face of challenging circumstances. - Expert + Influence, ability to persuade, lead, and influence others to achieve desired outcomes. - Expert + Willing to Learn, open to new ideas, and has a desire to continuously learn to stay current with the latest trends, threats, and technology. - Expert + Documentation involves creating, maintaining, and managing detailed and accurate records and documentation to support organizational processes and decisions. - Expert **Other Requirements** + Completed Bachelor's degree in computer science, information technology, cybersecurity, or a related field. Master's degree preferred. + 10+ years' experience in an enterprise information security role + 10+ years' experience in a leadership role + Advanced Certifications: CISSP, CRISC, GCEIT, CISM, GIAC The estimated annual pay range for this position is $275,000 - $350,000 which includes a base salary and bonus. The compensation for this position is dependent on job-related knowledge, skills, experience, and market location and, therefore, will vary from individual to individual. Benefits may include, but are not limited to, medical, vision, dental, 401K, and flexible spending. Equal Employment Opportunity - M/F/Disability/Protected Veteran Status
    $101k-135k yearly est. 25d ago
  • Information System Security Officer (ISSO) - Columbia, SC/On-Site

    STI 4.8company rating

    Information security analyst job in Columbia, SC

    Information System Security Officer (ISSO) INTERVIEWS WILL BE CONDUCTED VIA TEAMS. INTERVIEWS WILL BE CONDUCTED BY SCEIS MANAGEMENT TEAM. Duration of the Contract: 12 months Possibility for Extension: Yes Interview Process: 2 rounds, Virtual & In Person Work Location: Fully Onsite - 5 days onsite. Candidates must be able to be onsite at Jefferson Square starting on the first day of employment. Remote work is not available for this position. Candidate Location: Candidate MUST be a SC resident or willing to relocate to SC prior to starting the role at their own expense. Full job description attached & required/preferred skills are stated below. Technical Knowledge: Hands on experience with any or all the following technologies would be considered a desirable for this position: 1. Archer (eGRC) 2. Enterprise NoSQL Database 3. IBM System 390/zSeries 4. Linux and Windows servers 5. Network Firewalls, Intrusion Prevention Systems (IPS), Switching and Routing Infrastructure 6. Security Information and Event Management (SIEM) solutions 7. Identity and Access Management (IAM) solutions General Duties and Responsibilities: 1. Perform detailed architectural reviews and risk analysis of security related requests in order to make sound decision making recommendations, such as: a. Network Design and Information Flow b. System and Data Access Models c. Review Firewall Rule Requests (Ports, Protocols, and Services) d. Baseline Configuration Management Deviation Requests e. Vulnerability Management 2. Champion the design, development, implementation, and/or ongoing maturation of SCDHHS security and compliance efforts. 3. Audit and assess internal agency systems as well as business partner/service provider information system security controls. 4. Utilize Microsoft Office software suite, System Center Service Manager (Ticketing system), Archer eGRC system, Bizagi, Atlassian and other products to document and report on information gathered during Audit and Assessment activities or other OCS efforts. 5. Perform security and compliance reviews of Contracts, Business Associate Agreements, Data Usage/Sharing Agreements, and other types of documents and artifacts. 6. Serve as primary point of contact for third-party audits and/or assessments of agency and business partner systems 7. Collaborate with agency leadership, business partners, and other parties/ stakeholders to provide recommendations for security and compliance risk mitigation efforts. Required Knowledge/Skills: 1. Must have a strong working knowledge of FISMA, NIST, CMS MARS-E and HIPAA Security and Privacy. 2. 5+ years of experience in IT working with and/or auditing IBM System 390/zSeries, Windows, Linux, Databases (Relational and Non-Relational), Networking Infrastructure, and Web-based Applications. 3. Prior experience working within a FISMA compliant program. 4. Prior experience in working with any eGRC systems. 5. Prior Health Information Technology experience. 6. ISC(2), ISACA, SANS GIAC and/or other Information Security Certification is required. 7. Ability to work independently and as a member of a team. 8. Ability to collaborate and coordinate with multiple teams and vendors. 9. Ability to multitask and prioritize tasks effectively in order to meet deadlines. 10. Experience and training with eGRC solutions. 11. Ability to engage diverse audiences of varying technical and non-technical skill- levels to ensure effective alignment of technical requirements to business objectives. 12. Ability to collaborate and coordinate efforts amongst multiple teams and vendors in fulfillment of SCDHHS OCS initiatives. 13. Ability to multitask and prioritize tasks effectively in order to meet deadlines in a results-oriented environment. 14. Must have intermediate to advanced skills in Microsoft Office products (Word, Excel, PowerPoint, Visio) to include working with templates and style guidelines for branding consistency. 15. Keen attention to detail while maintaining the ability to see the big picture. 16. Ability to absorb, retain and communicate complex processes. 17. Ability to accept changes and constructive criticism and remain flexible in dealing with leadership and teams of varying technical and business knowledge. Preferred Requirements/Skills: 1. BS degree in computer science or similar discipline or 10+ years of experience in the field or a in a related area. 2. Prior ITIL experience in the area of Information Security Management. REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE): 1. 5+ years of experience in IT working with and/or auditing IBM System 390/zSeries, Windows, Linux, Databases (Relational and Non-Relational), Networking Infrastructure and Web-based Applications. 2. Prior experience working within a FISMA compliant program. 3. Prior experience in working with any eGRC systems. 4. Prior Health Information Technology experience. REQUIRED EDUCATION/CERTIFICATIONS: 1. ISC(2), ISACA, SANS GIAC and/or other Information Security Certification is required. PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE): Prior ITIL experience in the area of Information Security Management. PREFERRED EDUCATION/CERTIFICATIONS: 1. Bachelor's in a related area or 10+ years of experience in the field or in a related area.
    $61k-81k yearly est. 37d ago
  • Security Analyst

    Mit Resource 4.7company rating

    Information security analyst job in Columbia, SC

    RESPONSIBILITIES : • Assists in the development and implementation of security policies and standards for IT related items procured by the agency (e.g., hardware and software); • Researches and reviews various national and international security standards (e.g., Internal Revenue Service, Federal Information Processing (FIPS), National Institute of Standards and Technology (NIST), and International Organization for Standardization (ISO)) and explains the results, both orally and in writing; • Attends meetings with the Contract Attorney, General Counsel, Chief Information Officer, Chief Information Security Officer, and Deputy Director in order to determine agency policy as it relates to Information Security. REQUIRED SKILLS: - Oral and written communication skills; - Experience in developing and maintaining documentation for security policies, procedures, and best practices; - Providing continual consultation and written reports to senior management concerning security issues; - Hands-on experience documenting and managing all aspects of security within an enterprise organization, including but not limited to: o Firewall and IDS/IPS experience; o Virtual Private Networking (VPN); o Network access policies; o Web filters; o Publically accessible assets; o Active directory; o Security compliance for third party and/or in-house developed applications; o Virtualization and Storage area networking security; and o Anti-Virus management; - Experience preparing and submitting Security Program evaluations and compliance reports; - Working with other Department leaders, designing security components for operations and other strategic processes, and supervising the development and implementation of required security reporting devices and processes at all levels. Extensive working knowledge of Internet protocols, tools, and techniques including but not limited to: o Virtual Private Networking (VPN); o TCP/IP, Local Area Networks (LAN), Wide Area Networks (WAN); o Network device operating systems security configuration; o Internet security; and o Internet Information Server; - Knowledge of Virtual Machine operation, strengths, and weaknesses; - Experience with VMWare ESX security; - Support of web-based applications for internal (intranet) sites and external (Internet) sites; - Experience and working knowledge of backup products and methodologies.. Qualifications EXPERIENCE: • At least 10 years experience working as the Chief Information Security Officer, Security Officer, Security Consultant, or Security Analyst for a state or federal agency or large corporation. • Minimum 6 + Years experience in Application Security and Security - Knowledge in networking, databases, systems and Web operations. • 6 + Years experience in Security Information Architecture and Windows Security - Group Policy, Network access policies, User access policies. • 2 - 4 Years experience in Anti-Virus management and VPN - virtual private network. • And 6 + Years experience in Software Development Lifecycle - SDLC. • 2 - 4 Years experience in Firewall and Web Filters. • 6 + Years experience in Experience in developing and maintaining documentation for policies, procedures, and best practices, NIST Security. Additional Information Please help pass along to colleagues or associates below position who are looking for new role if you are not available. Should someone need more information I can be reached at narendra AT mitresource DOTcom Thank you for your time.
    $61k-85k yearly est. 6h ago
  • Information System Security Officer Mid-Level

    Bae Systems 4.7company rating

    Information security analyst job in Columbia, SC

    Designs, tests and implements security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Researches attempted or successful efforts to compromise systems security and designs countermeasures. Maintains hardware, software and network firewalls and encryption protocols. Administers security policies to control physical and virtual access to systems. **Required Education, Experience, & Skills** Typically a Bachelor's Degree and 8 years work experience or equivalent experience **Preferred Education, Experience, & Skills** Experience with either CSAM or JCAM **Pay Information** Full-Time Salary Range: $95106 - $161680 Please note: This range is based on our market pay structures. However, individual salaries are determined by a variety of factors including, but not limited to: business considerations, local market conditions, and internal equity, as well as candidate qualifications, such as skills, education, and experience. Employee Benefits: At BAE Systems, we support our employees in all aspects of their life, including their health and financial well-being. Regular employees scheduled to work 20 hours per week are offered: health, dental, and vision insurance; health savings accounts; a 401(k) savings plan; disability coverage; and life and accident insurance. We also have an employee assistance program, a legal plan, and other perks including discounts on things like home, auto, and pet insurance. Our leave programs include paid time off, paid holidays, as well as other types of leave, including paid parental, military, bereavement, and any applicable federal and state sick leave. Employees may participate in the company recognition program to receive monetary or non-monetary recognition awards. Other incentives may be available based on position level and/or job specifics. **Information System Security Officer Mid-Level** **119224BR** EEO Career Site Equal Opportunity Employer. Minorities . females . veterans . individuals with disabilities . sexual orientation . gender identity . gender expression
    $52k-72k yearly est. 6d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Information security analyst job in Columbia, SC

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding. **Responsibilities:** + **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture. + **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders. + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 35d ago
  • Security Anlyst

    Ask It Consulting

    Information security analyst job in Columbia, SC

    ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations. We have openings for Security Analyst for one of our client in Columbia SC Job Description Looking for a CA, familiar with setting up and maintaining a C&A framework ..from scratch. 10+ years of experience of Information Assurance (IA) experience that includes obtaining and managing NIST-800 or DIACAP security certification and accreditation (C&A) of systems, networks, and sites. • Broad knowledge of NIST and Federal Information Security Management Act (FISMA) and the associated reporting requirements • Develop pre-briefs and post-briefs for senior level officials. • Reviewing and maintaining of certification plans and accreditations documentation, performing security, analyses and risk/vulnerability assessments, conducting security tests and evaluations, and the coordination of certification and accreditation activity for project teams • Strong Information assurance skills • Working in a constantly changing threat environment • Managing and leading efforts in the review, application and maintenance of information assurance policies and procedures • Must have experience working with FSO and DAA and writing Plan of action and Milestones (POA&M) and the importance of tracking these to completion. Additional Information Ask IT Consulting Inc.| 33 Peachtree St., Suite 100 |Holtsville, NY 11742 Website: **********************
    $55k-76k yearly est. 60d+ ago
  • Security Analyst

    Msysinc

    Information security analyst job in Columbia, SC

    REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE): 6 years information security experience Excellent written skills; Proven work experience in process improvement Ability to identify processes that must be in place for an IT organization to be efficient Extensive knowledge of IRS Pub 1075, NIST 800-53, ITIL, and CJIS Process Management ITIL Business Analysis experience to include data flow diagrams, requirements specifications, use case scenarios, and acceptance testing. Ability to work with security technicians to develop detailed procedures; Ability to quickly grasp complex technical concepts and make them easily understandable in both text and diagrams/flow charts Ability to deliver high quality documentation with attention to detail. REQUIRED EDUCATION: Bachelor's Degree in a relevant field of work or equivalent work experience. Additional Information All your information will be kept confidential according to EEO guidelines.
    $55k-76k yearly est. 6h ago
  • Staff AI Security Architect

    Datavant

    Information security analyst job in Columbia, SC

    Datavant is a data platform company and the world's leader in health data exchange. Our vision is that every healthcare decision is powered by the right data, at the right time, in the right format. Our platform is powered by the largest, most diverse health data network in the U.S., enabling data to be secure, accessible and usable to inform better health decisions. Datavant is trusted by the world's leading life sciences companies, government agencies, and those who deliver and pay for care. By joining Datavant today, you're stepping onto a high-performing, values-driven team. Together, we're rising to the challenge of tackling some of healthcare's most complex problems with technology-forward solutions. Datavanters bring a diversity of professional, educational and life experiences to realize our bold vision for healthcare. **What We're Looking For** As a Staff AI Security Architect at Datavant, you will lead the design, evolution, and adoption of secure by design principles across our AI and Machine Learning (ML) systems. This role sits at the intersection of AI innovation and security architecture. You will define and operationalize AI security strategy, embed security into the AI/ML development lifecycle, and partner deeply with data science, engineering, product, legal, and compliance teams to ensure our AI systems are secure, trustworthy, and scalable. **What You Will Do** + Establish AI security architectural standards, design patterns, and best practices adopted across engineering teams. + Architect and advise on secure end-to-end AI systems, including data pipelines, model training, evaluation, deployment, runtime monitoring, and agentic workflows. + Lead threat modeling, architecture reviews, and risk assessments for AI-driven products, including LLMs, agent frameworks, and multi-agent systems. + Define and evolve a comprehensive AI/ML secure development lifecycle integrated into existing SDLC practices. + Develop reference architectures, documentation, and reusable security components to accelerate secure AI adoption. + Collaborate with legal, privacy, compliance, and responsible AI stakeholders to align security controls with regulatory and ethical requirements. + Act as a trusted advisor to senior leadership on AI security risks, trade-offs, and long-term strategy. **What You Need to Succeed** + 8+ years of experience in security architecture, application security, or product security, with meaningful focus on AI/ML systems. + Hands-on experience securing AI/ML or LLM-based systems, including familiarity with modern AI architectures and agentic workflows. + Strong understanding of AI threat models, including adversarial ML, prompt injection, data poisoning, model theft, and abuse scenarios. + Proven ability to design and influence security architectures for large-scale, distributed systems. + Strong communication skills with the ability to translate complex technical concepts to both technical and non-technical stakeholders. + Have a strong understanding of security controls, both those that exist in audit standards as well as practical controls that can help reduce risk and increase safety. **What Helps You Stand Out** + Hands-on experience building, testing, or tinkering with agentic AI workflows, with an understanding of the security risks they introduce. + Experience securing AI/ML workloads in Databricks, with a deep understanding of its platform-specific security risks. + You have experience with security in healthcare or other highly regulated space. Examples: HIPAA, HITRUST, SOC 2, PCI, FedRamp experience from an operational response standpoint. We are committed to building a diverse team of Datavanters who are all responsible for stewarding a high-performance culture in which all Datavanters belong and thrive. We are proud to be an Equal Employment Opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, sex, sexual orientation, gender identity, religion, national origin, disability, veteran status, or other legally protected status. At Datavant our total rewards strategy powers a high-growth, high-performance, health technology company that rewards our employees for transforming health care through creating industry-defining data logistics products and services. The range posted is for a given job title, which can include multiple levels. Individual rates for the same job title may differ based on their level, responsibilities, skills, and experience for a specific job. The estimated total cash compensation range for this role is: $224,000-$280,000 USD To ensure the safety of patients and staff, many of our clients require post-offer health screenings and proof and/or completion of various vaccinations such as the flu shot, Tdap, COVID-19, etc. Any requests to be exempted from these requirements will be reviewed by Datavant Human Resources and determined on a case-by-case basis. Depending on the state in which you will be working, exemptions may be available on the basis of disability, medical contraindications to the vaccine or any of its components, pregnancy or pregnancy-related medical conditions, and/or religion. This job is not eligible for employment sponsorship. Datavant is committed to a work environment free from job discrimination. We are proud to be an Equal Employment Opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, sex, sexual orientation, gender identity, religion, national origin, disability, veteran status, or other legally protected status. To learn more about our commitment, please review our EEO Commitment Statement here (************************************************** . Know Your Rights (*********************************************************************** , explore the resources available through the EEOC for more information regarding your legal rights and protections. In addition, Datavant does not and will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay. At the end of this application, you will find a set of voluntary demographic questions. If you choose to respond, your answers will be anonymous and will help us identify areas for improvement in our recruitment process. (We can only see aggregate responses, not individual ones. In fact, we aren't even able to see whether you've responded.) Responding is entirely optional and will not affect your application or hiring process in any way. Datavant is committed to working with and providing reasonable accommodations to individuals with physical and mental disabilities. If you need an accommodation while seeking employment, please request it here, (************************************************************** Id=**********48790029&layout Id=**********48795462) by selecting the 'Interview Accommodation Request' category. You will need your requisition ID when submitting your request, you can find instructions for locating it here (******************************************************************************************************* . Requests for reasonable accommodations will be reviewed on a case-by-case basis. For more information about how we collect and use your data, please review our Privacy Policy (**************************************** .
    $89k-133k yearly est. 2d ago
  • ITPROUS_PS_SC_112524_11455 -1_Security Architect - Consultant

    Itprofound

    Information security analyst job in Columbia, SC

    JOB DESCRIPTION: SCOPE OF THE PROJECT: THE POSITION WILL WORK AS A SECURITY ARCHITECT WITHIN THE DIVISION OF INFORMATION SECURITY AND WILL ASSIST WITH THE IMPLEMENTATION, INTEGRATION, AND OPERATIONALIZING SECURITY TECHNOLOGIES. THIS POSITION REQUIRES EXPERIENCE IN INFORMATION SECURITY ARCHITECTURE AND SOLUTION DESIGN TO ASSIST IN THE STRATEGIC PLANNING, DESIGNING, AND IMPLEMENTATION OF NEW SYSTEMS AND CHANGES IN CURRENT SYSTEMS IN A SECURE MANNER. THIS POSITION IS EXPECTED TO BE NEEDED FOR 12 MONTHS WITH THE POSSIBILITY OF EXTENSION. DAILY DUTIES / RESPONSIBILITIES: • LOGGING AND EVENT MANAGEMENT - ENSURING THAT APPROPRIATE SECURITY LOGS ARE INGESTED INTO THE SIEM AND/OR LOG AGGRIGATION PLATFORM AND PROPERLY PARSED TO SUPPORT SECURITY OPERATIONS • RESPONSIBLE FOR PLANNING, DESIGNING, DEVELOPMENT AND IMPLEMENTATION OF ENTERPRISE SECURITY ARCHITECTURE SOLUTIONS THAT ALIGN WITH BUSINESS GOALS AND RISK TOLERANCE. LEVERAGING STATE APPROVED PROCESSES AND TECHNOLOGIES WHEREVER POSSIBLE. • LEAD PROCESS DEFINITION, REDESIGN AND/OR TECHNOLOGY INNOVATION OF SECURITY ARCHITECTURE, TO ENSURE DIS SOLUTIONS SUPPORT SECURE DELIVERY OF ENTERPRISE BUSINESS ARCHITECTURE AND SERVICES. • DESIGN, DEPLOY AND MANAGE COUNTERMEASURES TO KNOWN SECURITY THREATS AND DEVELOP PREVENTATIVE MITIGATION STRATEGIES FOR NEW AND EMERGENT THREATS TO ENTERPRISE DATA, NETWORKS AND ASSOCIATED SERVICES. • ENSURE, VALIDATE AND MEASURE THE CONSISTENT APPLICATION OF PROTECTIVE MEASURES THROUGHOUT THE ENTERPRISE BUSINESS APPLICATION AND INFRASTRUCTURE SUPPORT ENVIRONMENTS. TAKE APPROPRIATE ACTION TO PROTECT STATE DATA AND TECHNOLOGY SERVICES. Requirements REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE): • CYBER SECURITY AWARENESS AND UNDERSTANDING • EXPERIENCE WITH LINUX, WINDOWS, NETWORK SECURITY PROTOCOLS AND PROCEDURES • EXPERT UNDERSTANDING OF ACCESS CONTROL, LOGGING AND REPORTING SYSTEMS PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE): • SIEM MANAGEMENT • INTRUSION PREVENTION SYSTEMS (IPS) • SECURITY FRAMEWORKS: NIST, CSF, CJIS, IRS 1075, CMS MARS -E • APPLICATION SECURITY (APPSEC) REQUIRED EDUCATION/CERTIFICATIONS: • BACHELOR'S DEGREE IN AN INFORMATION TECHNOLOGY OR INFORMATION SECURITY RELATED FIELD • SIX YEARS OF RELEVANT WORK EXPERIENCE MAY BE SUBSTITUTED IN LIEU OF EDUCATION • THREE YEARS OF EXPERIENCE IN SUPPORTING LARGE IT ENVIRONMENTS AND/OR SYSTEM DEPLOYMENTS PREFERRED EDUCATION/CERTIFICATIONS: • GSEC • GCED BenefitsHealth Insurance Sick Leave
    $89k-133k yearly est. 60d+ ago
  • Information Systems Security Officer TS/SCI with Poly REQUIRED

    CGI Group Inc. 4.5company rating

    Information security analyst job in Columbia, SC

    Seeking an Information Systems Security Officer (ISSO) with a proven track record of DevSecOps success to include a combination of technical skills, communication skills, and cybersecurity skills. is located in Columbia, MD. Your future duties and responsibilities: . Ensure the implementation and maintenance of security controls in accordance with RMF v5 . Manage ATO packages . Draft security documentation including Operating Procedures, Cybersecurity Strategy (CSS), System Security Plans (SSP) ATO packages as well as System Security and Privacy Plan (SSPP) in accordance with DoD policies, Department of Airforce (DAF) regulations and our Federal Government customer's guidance. . The candidate must have expert knowledge and demonstrated experience with cybersecurity technologies, risk management, and incident response procedures as well as have a solid working understanding of computer functions, including hardware, software, and operating systems. This includes knowledge of Windows, Unix, and Linux operating systems, along with other applications such as databases, web servers, networking technologies, including routing, switching, and VPNs. . The ISSO must be able to work autonomously, manage their workload effectively, shift priorities with little to no loss of productivity and communicate effectively with technical and non-technical personnel. Required qualifications to be successful in this role: . Bachelor's degree and 8+ years of experience, or Master's Degree and 6+ years of experience, or PhD and 3+ years of experience. A degree should be within one of the following fields: Information Technology, Computer Science, Cybersecurity, Information Systems, Data Science, or Software Engineering. However, an additional 4 years of relevant experience may be considered in lieu of a Bachelor's degree. . Well-versed in best practices for cyber security program standards, processes, and procedures compliance, industry-standard security frameworks and demonstrated expert working knowledge of NIST Special Publication (SP) 800-53: Recommended Security Controls for Federal Information Systems, NIST SP 800-53A: Guide for Assessing the Security Controls in Federal Information Systems, AFPD 17-1 and AFI 17-130, Cybersecurity Program Management. . Ability writing security policies and procedures, CSS, SSP, SSPP, and assess all ATO package artifacts. . Expert knowledge of Risk Management Framework (RMF) v5 (Processes, workflow, etc.). . Ability to use eMASS to execute, RMF v5 to include document / update system status, identify, document, and manage implementation of operational and technical security controls, implementation and risk assessment tabs, non-compliant and non-validated controls, POAM management (entry, evidence, close-out), produce report and track Plan of Action and Milestone (POA&M) due dates, etc. . The ability to complete a checklist to ensure Security Authorization Process documents are complete and comply with all guidance. . Ability to work collaboratively with IT counterparts, communicate effectively (skilled in communicating complex technical information to non-technical audience) and coordinate STIG remediation with system administrators and developers. . Ability to conduct risk assessments, monitor security Incidents and respond appropriately to Security Threats. . Working understanding of network technology (includes knowledge of network protocols Desired qualifications/non-essential skills required: . Experience transitioning from RMF v4 to v5. . Experience with cloud computing platforms such as AWS and Azure. . Basic understanding of identity and access management system capabilities and configuration. . Experience with TASKORDS, OPORDS, etc. . Experience leading Cybersecurity (ISSO & ISSE) teams. CGI is required by law in some jurisdictions to include a reasonable estimate of the compensation range for this role. The determination of this range includes various factors not limited to skill set, level, experience, relevant training, and licensure and certifications. To support the ability to reward for merit-based performance, CGI typically does not hire individuals at or near the top of the range for their role. Compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range for this role in the U.S. is $79,600.00 - $194,000.00. CGI Federal's benefits are offered to eligible professionals on their first day of employment to include: . Competitive compensation . Comprehensive insurance options . Matching contributions through the 401(k) plan and the share purchase plan . Paid time off for vacation, holidays, and sick time . Paid parental leave . Learning opportunities and tuition assistance . Wellness and Well-being programs #CGIFederalJob #LI-LB1 #ClearanceJobs Skills: * CompTIA Security+ * Network * TCP/IP What you can expect from us: Together, as owners, let's turn meaningful insights into action. Life at CGI is rooted in ownership, teamwork, respect and belonging. Here, you'll reach your full potential because… You are invited to be an owner from day 1 as we work together to bring our Dream to life. That's why we call ourselves CGI Partners rather than employees. We benefit from our collective success and actively shape our company's strategy and direction. Your work creates value. You'll develop innovative solutions and build relationships with teammates and clients while accessing global capabilities to scale your ideas, embrace new opportunities, and benefit from expansive industry and technology expertise. You'll shape your career by joining a company built to grow and last. You'll be supported by leaders who care about your health and well-being and provide you with opportunities to deepen your skills and broaden your horizons. Come join our team-one of the largest IT and business consulting services firms in the world. Qualified applicants will receive consideration for employment without regard to their race, ethnicity, ancestry, color, sex, religion, creed, age, national origin, citizenship status, disability, pregnancy, medical condition, military and veteran status, marital status, sexual orientation or perceived sexual orientation, gender, gender identity, and gender expression, familial status or responsibilities, reproductive health decisions, political affiliation, genetic information, height, weight, or any other legally protected status or characteristics to the extent required by applicable federal, state, and/or local laws where we do business. CGI provides reasonable accommodations to qualified individuals with disabilities. If you need an accommodation to apply for a job in the U.S., please email the CGI U.S. Employment Compliance mailbox at US_Employment_******************. You will need to reference the Position ID of the position in which you are interested. Your message will be routed to the appropriate recruiter who will assist you. Please note, this email address is only to be used for those individuals who need an accommodation to apply for a job. Emails for any other reason or those that do not include a Position ID will not be returned. We make it easy to translate military experience and skills! Click here to be directed to our site that is dedicated to veterans and transitioning service members. All CGI offers of employment in the U.S. are contingent upon the ability to successfully complete a background investigation. Background investigation components can vary dependent upon specific assignment and/or level of US government security clearance held. Dependent upon role and/or federal government security clearance requirements, and in accordance with applicable laws, some background investigations may include a credit check. CGI will consider for employment qualified applicants with arrests and conviction records in accordance with all local regulations and ordinances. CGI will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with CGI's legal duty to furnish information.
    $56k-78k yearly est. 11d ago
  • Mainframe Security Engineer

    Ensono 4.4company rating

    Information security analyst job in Columbia, SC

    Mainframe Security EngineerRemote - United StatesJR012476 **Requirements:** + U.S. Citizenship is required. + Must pass a Federal Background Check. **Key Responsibilities:** + Administer security for RACF, ACF2, and Top Secret logon IDs, datasets, and resource rules. + Provision user access in response to ServiceNow tickets within defined SLAs. + Monitor system security policies and investigate violations/incidents. + Perform and review daily, weekly, and monthly audit reports. + Liaise with business units and technical support teams. + Prepare ad hoc reports and deliver presentations for customer support. + Ensure adherence to security standards across the environment. + Provide 24×7 on-call support as required. + Utilize Vanguard and/or IBM zSecure security products. + iSeries security knowledge is a plus. + Manage and lead large projects or tasks as needed. + Project management skills are highly desired. **Technical Skills:** + Proficient in TSO, JCL, IBM Utilities, JES2, and ISPF. + Experience with REXX or other programming languages is desired. + CICS security administration experience preferred. + Experience with Vanguard and/or IBM zSecure security products is desired. + Familiarity with IAM (Identity Access Management), MFA (Multi-Factor Authentication), and PAM (Privileged Access Management) is desired. + Strong PC skills, including Microsoft Outlook, Word, Excel, and PowerPoint. **General Knowledge:** + z/OS experience is highly desired. + Knowledge of other mainframe security products is a plus. **Personal Skills:** + Strong written and verbal communication skills. + Excellent organizational skills with the ability to manage multiple concurrent projects and work as part of a global team. + Ability to work independently and take initiative. + Strong analytical and problem-solving skills. + Effective team player who can work independently in a fast-paced environment. + Self-starter, detail-oriented, and able to multitask. **Education & Certifications:** + Bachelor's or Master's degree preferred. + CISSP, CISA, CISM, or ITIL certification is a plus. **Why Ensono?** Ensono is a place to make better happen - for our clients and for your career. You can do great things through innovation or collaboration, by learning or volunteering, or to promote diversity and inclusion. You can do great things for your own health or for a healthier planet. Whatever it means to you to do great things we want Ensono to be the place you can do it. We are a client-facing business, but we do encourage clients to allow us to work remotely most of the time so if you are not required to be on a client site, you can choose to work from home or in our Ensono offices. Some of our benefits include: + Unlimited Paid Days Off + Three health plan options through Blue Cross Blue Shield + 401k with company match + Eligibility for dental, vision, short and long-term disability, life and AD&D coverage, and flexible spending accounts + Paid Maternity Leave, Paternity Leave, and Sabbatical Leave + Education Reimbursement, Student Loan Assistance or 529 College Funding + Enhanced fertility coverage + Wellness program + Depending on location, ability to take Flexible work schedule + Advantage of fitness centers As of the date of this posting, a good faith estimate of the current pay scale for this role is **$90,000 to $135,000** annually based on a full-time schedule. Please note that placement in the range may vary based on numerous factors including but not limited to skills, experience, internal equity, and business needs. In addition to base salary, other compensation programs, depending on eligibility, include an annual bonus plan based on company and individual performance and an equity grant under our Associate Equity Appreciation Program. Ensono is an Equal Opportunity/Affirmative Action employer. We are committed to providing equal employment to our Associates and building a diverse and inclusive workforce. All qualified applicants will be considered without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability, or other legally protected basis, in accordance with applicable law. Pay transparency nondiscrimination statement/posting OFCCP's pay transparency policy can be found on OFCCP's website (*********************************************************************************************** . If you need accommodation at any point during the application or interview process, please let your recruiter know or email ****************************** . JR012476
    $90k-135k yearly 53d ago
  • Security Engineer - Secure Software Development

    Sedgwick 4.4company rating

    Information security analyst job in Columbia, SC

    By joining Sedgwick, you'll be part of something truly meaningful. It's what our 33,000 colleagues do every day for people around the world who are facing the unexpected. We invite you to grow your career with us, experience our caring culture, and enjoy work-life balance. Here, there's no limit to what you can achieve. Newsweek Recognizes Sedgwick as America's Greatest Workplaces National Top Companies Certified as a Great Place to Work Fortune Best Workplaces in Financial Services & Insurance Security Engineer - Secure Software Development Security Engineer - Secure Software Development **PRIMARY PURPOSE OF THE ROLE:** To manage the implementation of security measures to protect company data, networks, and computer systems. To focus on executing security fundamentals for threat detection, investigation, and response efforts. **ARE YOU AN IDEAL CANDIDATE?** We are looking for enthusiastic candidates who thrive in a collaborative environment, who are driven to deliver great work, are customer-oriented and are naturally empathetic. **ESSENTIAL RESPONSIBLITIES MAY INCLUDE** + Engineers, implements and monitors security measures for the protection of computer systems, networks and information. + Identifies and defines system security requirements. + Designs computer security architecture and develops detailed cyber security designs. + Prepares and documents standard operating procedures and protocols. + Configures and troubleshoots security infrastructure devices. + Develops technical solutions and new security tools to assist in mitigating security vulnerabilities and automating repeatable tasks. + Leads IT groups and business units as necessary in troubleshooting compatibility issues between security tools and business or productivity programs. + Performs analysis of suspected malicious code and other software or programs and provides written or verbal analysis to management. + Analyzes client and customer needs as required and provides clear and concise reports to leadership. + Works closely with management on assigned projects from inception through implementation ensuring adequate internal communication and user involvement is maintained. **QUALIFICATIONS** Eight (8) years of encryption technologies/algorithms, digital forensics, network topologies, and access controls experience or equivalent combination of educated and experience required. **Skills & Knowledge** + Knowledge of TCP/IP services + Knowledge of audit and compliance + Knowledge of vulnerability management + Knowledge of penetration testing + Knowledge of various operating systems + Knowledge of desktop productivity software + Knowledge of Carbon Black Protection + Knowledge of Symantec Endpoint Protection and host data loss prevention + Knowledge of information technology security frameworks + Excellent oral and written communication skills, including presentation skills + PC literate, including Microsoft Office products + Analytical and interpretive skills + Strong organizational skills + Excellent interpersonal skills + Ability to create and complete comprehensive, accurate and constructive written reports + Ability to work in a team environment + Ability to meet or exceed Performance Competencies **Proficient in Snyk for Application Security:** Demonstrated expertise in integrating Snyk into CI/CD pipelines to proactively identify and remediate vulnerabilities in open-source dependencies, container images, and infrastructure as code. Skilled in leveraging Snyk's developer-first tools to maintain secure codebases, enforce security policies, and ensure compliance with industry standards. Experienced in configuring automated scans, interpreting results, and collaborating with development teams to implement effective remediation strategies, contributing to a robust DevSecOps culture. **TAKING CARE OF YOU** + Career development and promotional growth opportunities + A diverse and comprehensive benefits offering including medical, dental vision, 401K, PTO and more \#LI-TS1 Work environment requirements for entry-level opportunities include - Physical: Computer keyboarding Auditory/visual: Hearing, vision and talking Mental: Clear and conceptual thinking ability; excellent judgement and discretion; ability to meet deadlines Travels as required The statements contained in this document are intended to describe the general nature and level of work being performed by a colleague assigned to this description. They are not intended to constitute a comprehensive list of functions, duties, or local variances. Management retains the discretion to add or to change the duties of the position at any time. Sedgwick is an Equal Opportunity Employer and a Drug-Free Workplace. **If you're excited about this role but your experience doesn't align perfectly with every qualification in the job description, consider applying for it anyway! Sedgwick is building a diverse, equitable, and inclusive workplace and recognizes that each person possesses a unique combination of skills, knowledge, and experience. You may be just the right candidate for this or other roles.** **Sedgwick is the world's leading risk and claims administration partner, which helps clients thrive by navigating the unexpected. The company's expertise, combined with the most advanced AI-enabled technology available, sets the standard for solutions in claims administration, loss adjusting, benefits administration, and product recall. With over 33,000 colleagues and 10,000 clients across 80 countries, Sedgwick provides unmatched perspective, caring that counts, and solutions for the rapidly changing and complex risk landscape. For more, see** **sedgwick.com**
    $78k-101k yearly est. 60d+ ago
  • Information Systems Security Officer II (Government)

    at&T 4.6company rating

    Information security analyst job in Columbia, SC

    This position requires office presence of a minimum of 5 days per week and is only located at customer's site. No relocation is offered. AT&T Global Public Sector is a trusted provider of secure, IP enabled, cloud-based, network solutions and professional services to the Federal Government. We are dedicated to recruiting, developing and empowering a diverse, high-performing workforce that is passionate about what they do, committed to our shared values and dedicated to our customers' mission. AT&T has an opening for an Information Systems Security Officer to support information assurance programs and ensure the security posture of mission critical systems. The ISSO will play a key role in supporting security authorization activities in alignment with program and government requirements. Job Duties/Responsibilities: Support the creation and continuous maintenance of the IT Systems Accreditation Documentation Packages (SSP, SCTM, CONOPs, A&A, Test Plan, SOP's. User Guides etc). Provide IA security on-site support for all formal IT systems and A&A testing. Ensure all on-site contract IT systems personnel are trained on all IA procedures and requirements for each of the IT systems. Provide IA Security qualified personnel resources to support the continued accreditation and security operation of the information system under the RMF Continuous Monitoring Plan. Review all hardware and software changes proposed and/or being implemented for appropriate security operation, providing configuration management support as it relates to the security configuration of the system, updating documentation and hardware and software inventory lists. Propose IA policy, procedures, provide IT security training, and perform IA oversight. Required Clearance: TS/SCI or Secret clearance (#tssci) (#secret) Required Qualifications: Bachelors degree in relevant field of study, 5 years of relevant experience Our ISSO II's earn between $98,100 - $228,600. Not to mention all the other amazing rewards that working at AT&T offers. Individual starting salary within this range may depend on geography, experience, expertise, and education/training. Joining our team comes with amazing perks and benefits: Medical/Dental/Vision coverage 401(k) plan Tuition reimbursement program Paid Time Off and Holidays (based on date of hire, at least 23 days of vacation each year and 9 company-designated holidays) Paid Parental Leave Paid Caregiver Leave Additional sick leave beyond what state and local law require may be available but is unprotected Adoption Reimbursement Disability Benefits (short term and long term) Life and Accidental Death Insurance Supplemental benefit programs: critical illness/accident hospital indemnity/group legal Employee Assistance Programs (EAP) Extensive employee wellness programs Employee discounts up to 50% off on eligible AT&T mobility plans and accessories, AT&T internet (and fiber where available) and AT&T phone Weekly Hours: 40 Time Type: Regular Location: Columbia, Maryland It is the policy of AT&T to provide equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state or local law. In addition, AT&T will provide reasonable accommodations for qualified individuals with disabilities. AT&T is a fair chance employer and does not initiate a background check until an offer is made.
    $98.1k-228.6k yearly Auto-Apply 52d ago
  • Senior Security Engineer

    Zentek Infosoft 4.2company rating

    Information security analyst job in Columbia, SC

    Zentek is a national recruiting company which partners with many of the leading employers in the Life Sciences, IT, and Financial Services sectors, feel free to check us out at ********************** Job Description Hi, Hope you are doing well !! My name is Ashita, resource professional with Zentek, Inc. Below are some key highlights of a contract position. If this is of interest please let me know. I would be happy to arrange a time to discuss the details and/or to further determine which types of opportunities you may be interested in exploring. Also help me out with your contact details. Job Title : Senior Security Engineer Location : South Carolina Duration : 3 months Contract to hire Role Description "The candidate will be responsible for: • Working directly with a broad range of security tools to implement changes and features • Developing strategies to improve operational workflow • Designing systems architectures and deployment strategies • Provide recommendations to overall system deployment and design • Providing expertise to members of the team and the customer • Gather detailed requirements necessary to develop a compliant solution to meet the client needs • Make recommendations for solutions needed to meet client demands Preferred Project or Engagement Background "The candidate will have the following attributes: • Expert in Linux System Administration • Expert in a broad range of security tools, Firewalls, NIDS, HIDS, SIEM, Endpoint protection. • Experience as a consultant, security engineer, similar responsibilities • Significant experience in security architecture and design techniques • Knowledge in compliance assessment and solutions for regimes such as PCI, HIPAA, SOX, etc • Knowledge of data center, cloud based environments, or Security Operations Center (SOC) • Knowledge of SOC workflow, and use of technology to replace manual labor • Have relevant industry IT security certifications • Knowledge and experience in Project Management, including related techniques and tools • Ability to interpret customer requirements and develop solutions to meet these requirements • Proven experience in writing statements of work and / or proposals in response to client requirements • Excellent communication and presentation skills • Ability to work closely with C Level executives in large enterprises • Commitment to excellence and willingness to do what is necessary to get the job done • Ability to travel in support of meetings, presentations, conferences, and similar events • Able to develop and deliver solutions, and thrive in a fast paced “start up” like environment Qualifications Required Skills: · security architecture and design · firewall · HIDS/NIDS · Linux · Scripting · SOC Workflow · network security · endpoint protection solutions Additional Information All your information will be kept confidential according to EEO guidelines.
    $89k-119k yearly est. 6h ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Forest Acres, SC?

The average information security analyst in Forest Acres, SC earns between $56,000 and $108,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Forest Acres, SC

$78,000
Job type you want
Full Time
Part Time
Internship
Temporary