Information security analyst jobs in Mount Pleasant, SC - 115 jobs
All
Information Security Analyst
Securities Analyst
Information Technology Analyst
Security Engineer
Cyber Security Engineer
Information Security Engineer
Senior Security Analyst
Information Systems Security Officer
Information Security Manager
Cyber Security Analyst
Information Assurance
Security Analyst
Elegant Enterprise-Wide Solutions, Inc.
Information security analyst job in Columbia, SC
Job Title: SecurityAnalyst
General Duties and Responsibilities:
Perform detailed architectural reviews and risk analysis of security related requests in order to make sound decision making recommendations, such as:
Network Design and Information Flow.
System and Data Access Models.
Review Firewall Rule Requests (Ports, Protocols, and Services).
Baseline Configuration Management Deviation Requests.
Vulnerability Management.
Champion the design, development, implementation, and/or ongoing maturation of security and compliance efforts.
Audit and assess internal agency systems as well as business partner/service provider information system security controls.
Utilize Microsoft Office software suite, System Center Service Manager (Ticketing system), Archer eGRC system, Bizagi, Atlassian and other products to document and report on information gathered during Audit and Assessment activities or other efforts.
Perform security and compliance reviews of Contracts, Business Associate Agreements, Data Usage/Sharing Agreements, and other types of documents and artifacts.
Serve as primary point of contact for third-party audits and/or assessments of agency and business partner systems.
Collaborate with agency leadership, business partners, and other parties/stakeholders to provide recommendations for security and compliance risk mitigation efforts.
Preferred Requirements/Skills:
BS degree in computer science or similar discipline or 10+ years of experience in the field or a in a related area.
Prior ITIL experience in the area of InformationSecurity Management.
REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):
5+ years of experience in IT working with and/or auditing IBM System 390/zSeries, Windows, Linux, Databases (Relational and Non-Relational), Networking Infrastructure and Web-based Applications.
Prior experience working within a FISMA compliant program.
Prior experience in working with any eGRC systems.
PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
Prior ITIL experience in the area of InformationSecurity Management.
REQUIRED EDUCATION/CERTIFICATIONS:
ISC(2), ISACA, SANS GIAC and/or other InformationSecurity Certification is required.
PREFERRED EDUCATION/CERTIFICATIONS:
Bachelor's in a related area or 10+ years of experience in the field or in a related area.
"No phone calls please."
$55k-76k yearly est. 4d ago
Looking for a job?
Let Zippia find it for you.
Entry Level Healthcare IT Analyst
Optimum Healthcare It 4.3
Information security analyst job in Charleston, SC
Start Your Career in Healthcare Information Technology Today!
Getting your first job can be difficult when employers want experience, but to gain that experience, you need your first job. We bridge the gap between your education and professional career by helping you gain the experience and training you need within the Healthcare Information Technology Industry.
Optimum Healthcare IT is looking for recent college graduates with an interest in moving into the Healthcare IT Industry. Our Optimum CareerPath training program will equip you with the tools needed for your success as a Healthcare IT Analyst.
Healthcare IT Analyst Job Responsibilities:
· The Healthcare IT Analyst will have primary responsibility for the design, build/configuration, testing, validation, documentation, and ongoing support for the Healthcare applications.
· This position will implement, administer, and support assigned systems under the guidance of senior members of the team.
· The position will have a good understanding of healthcare organizations, ancillary systems, and health system operations.
· Analyze and document user requirements, procedures, and problems to automate or improve existing systems. Review system capabilities, workflow, and scheduling limitations.
· Document workflows, configure and/or build activities, change management adherence, end-user notifications, training information, and status reporting in the appropriate system.
· Develop, document, and revise system design procedures, test procedures, and quality standards.
· Expand or modify the system to serve new purposes or improve workflows.
· Review and analyze the system and performance indicators to locate problems and correct errors. Escalate problems and issues to the appropriate staff to ensure timely resolution.
· Coordinate projects, schedule, and facilitate meetings as necessary to complete assignments.
· Technical and functional analyst support of systems that may include Electronic Health Records platforms (Epic, Cerner), IT Project Management, ERP Systems (Workday, Oracle, PeopleSoft, UKG), ITSM applications (ServiceNow), data and analytics applications (Tableau, PowerBI), cloud deployments (GCP, Azure, AWS), and other digital platforms and services.
Requirements:
· Bachelor's Degree
· US work authorization (This position is not open to any H1B /F1/ H-4 EAD OPT/STEM degrees)
· Excellent communication skills (verbal and written)
· Ability to exercise tact and good interpersonal skills
· Superb analytical and time management skills required
· Self-starter, self-motivated, high level of initiative
· Result-focused, ability to solve complex problems and resolve conflicts in a timely manner
· Internships or research project work are highly desired in a healthcare setting
· Understanding of how data works and looks, coming from different formats, is preferred
· Ability to travel during the training program if necessary
$57k-78k yearly est. 4d ago
Sr. Security Analyst
Maximus 4.3
Information security analyst job in Charleston, SC
Description & Requirements Maximus is seeking a qualified Sr. Technical/SecurityAnalyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned.
*This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. *
Essential Duties and Responsibilities:
- Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary.
- Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget.
- Work closely with management and work groups to create and maintain work plan documents.
- Track the status and due dates of projects.
- Manage relationships with project staff responsible for projects.
- Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed.
- Facilitate regular meetings and reviews.
- Adhere to contract requirements and comply with all corporate policies and procedures.
Job Specific Duties and Responsibilities:
-Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects.
-Review project documentation and client materials and provide analysis of technical and security related topics.
-Participate in client meetings and offer observations and insight on technical and security related topics.
-Identify risk areas and potential problems that require proactive attention.
-Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to:
*System Security Plan
*Plan of Action and Milestones (POA&M)
*Security Assessment Plan
*Risk Assessment reports
*CMS ARC-AMPE forms and documentation
*Data Conversion and Migration Management Plan
*Deployment and/or roll-out plans
-Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects.
-Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues.
-Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work.
-Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager.
-Complete project work in compliance with Maximus standards and procedures.
-Support team to complete assigned responsibilities as outlined in the Project schedule.
-Support all other tasks assigned by Senior Manager / Project Manager.
Minimum Requirements
- Bachelor's degree in related field.
- 7-10 years of relevant professional experience required.
- Equivalent combination of education and experience considered in lieu of degree.
Job Specific Requirements:
-Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required.
-Bachelor's degree from an accredited college or university, or equivalent work experience.
-7+ years of experience in informationsecurity, with at least 3 years of security-compliance work in a regulated industry.
-5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks.
-Familiar with operating systems: Windows, Linux/UNIX, OS/X.
-Familiar with AI tools, capabilities.
-Strong command of cloud computing topics.
-Strong command of agile software development practices as well as waterfall development practices.
-Strong desktop software skills: proficient in MS Office, Excel, Word, Project.
-Ability to explain and communicate technical subjects to non-technical audiences.
-Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills.
-Ability to work independently.
-Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously.
-Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential.
-Excellent verbal and writing skills and be comfortable working with customers.
-Ability to multi-task with supervision.
-Self-motivated fast learner.
Preferred Skills:
-Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid).
-Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional).
EEO Statement
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics.
Pay Transparency
Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances.
Accommodations
Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************.
Minimum Salary
$
120,000.00
Maximum Salary
$
140,000.00
$80k-107k yearly est. Easy Apply 6d ago
Information System Security Officer
Ifas LLC
Information security analyst job in Charleston, SC
The U.S. Department of State (DoS), Comptroller and Global Financial Services (CGFS), Chief Information Officer, Information Systems Security Office (CGFS/CIO/ISSO) requires the contractor to provide analytical and coordination support in the Information Systems Security Office (ISSO) as a SecurityAnalyst in applying interrelationships of multiple Cybersecurity specialties; IT architecture; new IA developments and applications; emerging technologies and their applications to business processes; IT security concepts, standards, and methods; project management principles and methods.
Minimum Requirements
Four-year degree in computer science, business, or closely related area.
Technical certification in computer systems security and a minimum of 5 years' experience in intrusion detection, vulnerability assessments, and network diagnostics.
Experience with DoS computer security policies and guidelines.
Security+ certification is required; CompTIA+ certification is preferred.
Job Responsibilities
CGFS Charleston ISSO Information Assurance and Risk Management Framework (RMF).
User creation and conditional email assignment of user and administrative accounts on CGFS General Support Systems.
Active role in network and systems design to ensure that appropriate systems security policies and procedures are contemplated and introduced into designs at the outset.
Assess breaches of security to determine their impact on system operations and the confidentiality, integrity, and reliability of the information stored and manipulated within the system. Applies findings to the development of corrective measures and user awareness.
Creation and maintenance of users for CGFS Financial Applications.
Creation and updating of Treasury Keys for supported applications.
Storing and distribution of classified peripheral devices.
Creation and maintenance of network drive folder file permissions.
Documenting visiting Government and Non-Government visitor's laptops.
Support internal and external access management audits.
Create and maintain ISO 9001 documentation for engineering and access management efforts Ability to communicate technical as well as non-technical information clearly, both orally and in writing.
Brief and maintain documentation for all users on automated information systems (AIS).
SharePoint development and maintenance.
Provide tier III support for all Information Systems Security.
Create, modify, and delete user accounts on automated information systems.
Security Clearance Requirement
All contractors supporting this Department must be able to either possess or obtain a security clearance of “Top Secret/SCI.”
Important note to consider
: A Secret Clearance will open a lot of other doors for your career in the Government to include possibilities of being hired directly.
Work Schedule
The employee will work an 8-hour shift between the hours of 6:15 am to 6:00 pm with a non-compensated 45-minute lunch (See your Project Manager for work schedule and department policies). Additional hours may be required and must be authorized by your Project Manager and DoS Management. This position requires 5 days on-site.
Software Systems Utilized:
Basic knowledge and experience with Windows 2012/2016/or future elaborations Server network environment.
Basic knowledge and experience on personal computers running Windows 10 or future elaborations workstation in a Windows network environment.
Experience with PC workstation operations including word processing, spreadsheets, and electronic mail, as well as knowledge of Windows 10 or future elaborations system internals such as the registry.
Ability to communicate technical as well as non-technical information clearly, both orally and in writing.
Formal Job-Specific Training Requirements:
IA 201 - Information Assurance for System Administrators
Our Most Successful Employees in this Position Demonstrate:
An understanding of the mission and business functions of the organization.
An ability to build relationships with key personnel who have authority or ability to ensure compliance with security laws, regulations, guidance, and requirements.
An ability to troubleshoot issues while maintaining appropriate operational security posture.
$60k-82k yearly est. Auto-Apply 60d+ ago
Information System Security Officer
IFAS LLC
Information security analyst job in Charleston, SC
Job Description
The U.S. Department of State (DoS), Comptroller and Global Financial Services (CGFS), Chief Information Officer, Information Systems Security Office (CGFS/CIO/ISSO) requires the contractor to provide analytical and coordination support in the Information Systems Security Office (ISSO) as a SecurityAnalyst in applying interrelationships of multiple Cybersecurity specialties; IT architecture; new IA developments and applications; emerging technologies and their applications to business processes; IT security concepts, standards, and methods; project management principles and methods.
Minimum Requirements
Four-year degree in computer science, business, or closely related area.
Technical certification in computer systems security and a minimum of 5 years' experience in intrusion detection, vulnerability assessments, and network diagnostics.
Experience with DoS computer security policies and guidelines.
Security+ certification is required; CompTIA+ certification is preferred.
Job Responsibilities
CGFS Charleston ISSO Information Assurance and Risk Management Framework (RMF).
User creation and conditional email assignment of user and administrative accounts on CGFS General Support Systems.
Active role in network and systems design to ensure that appropriate systems security policies and procedures are contemplated and introduced into designs at the outset.
Assess breaches of security to determine their impact on system operations and the confidentiality, integrity, and reliability of the information stored and manipulated within the system. Applies findings to the development of corrective measures and user awareness.
Creation and maintenance of users for CGFS Financial Applications.
Creation and updating of Treasury Keys for supported applications.
Storing and distribution of classified peripheral devices.
Creation and maintenance of network drive folder file permissions.
Documenting visiting Government and Non-Government visitor's laptops.
Support internal and external access management audits.
Create and maintain ISO 9001 documentation for engineering and access management efforts Ability to communicate technical as well as non-technical information clearly, both orally and in writing.
Brief and maintain documentation for all users on automated information systems (AIS).
SharePoint development and maintenance.
Provide tier III support for all Information Systems Security.
Create, modify, and delete user accounts on automated information systems.
Security Clearance Requirement
All contractors supporting this Department must be able to either possess or obtain a security clearance of “Top Secret/SCI.”
Important note to consider
: A Secret Clearance will open a lot of other doors for your career in the Government to include possibilities of being hired directly.
Work Schedule
The employee will work an 8-hour shift between the hours of 6:15 am to 6:00 pm with a non-compensated 45-minute lunch (See your Project Manager for work schedule and department policies). Additional hours may be required and must be authorized by your Project Manager and DoS Management. This position requires 5 days on-site.
Software Systems Utilized:
Basic knowledge and experience with Windows 2012/2016/or future elaborations Server network environment.
Basic knowledge and experience on personal computers running Windows 10 or future elaborations workstation in a Windows network environment.
Experience with PC workstation operations including word processing, spreadsheets, and electronic mail, as well as knowledge of Windows 10 or future elaborations system internals such as the registry.
Ability to communicate technical as well as non-technical information clearly, both orally and in writing.
Formal Job-Specific Training Requirements:
IA 201 - Information Assurance for System Administrators
Our Most Successful Employees in this Position Demonstrate:
An understanding of the mission and business functions of the organization.
An ability to build relationships with key personnel who have authority or ability to ensure compliance with security laws, regulations, guidance, and requirements.
An ability to troubleshoot issues while maintaining appropriate operational security posture.
$60k-82k yearly est. 15d ago
Cyber Engineer III
ITC Defense
Information security analyst job in Charleston, SC
Cyber Engineer III Overview: ITC Defense is seeking to hire a Cyber Engineer III in support of U.S. Navy /Air Force CYP (Child Youth Programs) CCTV Lifecycle Support Service program. Responsibilities:
Design, implement, and maintain security controls and architectures across networks, systems, and applications in alignment with NIST, ISO 27001, CIS, and Zero Trust principles.
Evaluate, integrate, and manage security tools and technologies, including SIEM, SOAR, EDR, IDS/IPS, DLP, and IAM solutions.
Lead or support advanced threat detection, incident response, forensic analysis, and remediation activities.
Conduct threat modeling, security design reviews, and root cause analysis for new and existing systems.
Perform system security assessments, risk analyses, and vulnerability management, including remediation tracking.
Coordinate and validate penetration testing efforts and report on security metrics and risk posture.
Support compliance, audit, and ATO activities (e.g., NIST 800-53, NIST 800-171, CMMC, FedRAMP).
Develop, maintain, and improve security documentation, policies, procedures, and incident response playbooks.
Other duties as assigned.
Minimum Qualifications:
Master's degree in Cybersecurity, Computer Engineering, Electrical Engineering, Electronics Engineering, or Mathematics with a concentration in Computer Science (or equivalent).
Minimum of ten (10) years of demonstrated experience preparing, implementing, and ensuring compliance with cybersecurity policies and standards.
DoD 8570.1M-compliant certification at one or more of the following levels, as required by PWS tasking:
Information Assurance Management (IAM) Level I
Information Assurance Technical (IAT) Level I
Information Assurance System Architect and Engineer (IASAE) Level I
Experience supporting Assessment and Authorization (A&A) activities, including planning, implementation, and ongoing compliance.
Experience designing, upgrading, monitoring, and maintaining cybersecurity measures to improve cyber defense and ensure network resiliency.
Proven experience assessing cybersecurity vulnerabilities, performing risk analysis, and developing and implementing remediation or risk mitigation strategies.
Experience ensuring security controls are in place to protect digital files and electronic infrastructure.
Experience responding to and reporting on cybersecurity incidents and security breaches.
Preferred Qualifications:
Experience with NIST, CMMC, Zero Trust, and cloud security frameworks (AWS, Azure, GCP).
Hands-on expertise with security tools (SIEM, SOAR, EDR, IDS/IPS, DLP, IAM) and vulnerability management.
Strong analytical, problem-solving, and critical-thinking skills to assess risks and develop solutions.
Excellent communication, collaboration, and mentoring abilities for cross-functional teams.
Why work at ITC Defense:
Employer Supplemented Health Insurance
Employer Paid Dental and Vision Insurance
Employer Paid Life and AD&D Insurance
3% Biweekly 401(k) Contribution
Paid Time Off
Tuition and Certification Reimbursement
Competitive Salaries with Performance Incentives
A positive working environment with supportive teammates and leadership
ITC Defense Corp. is committed to creating a diverse environment and is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or protected veteran status. U.S. Citizenship is required for most positions. This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Duties, responsibilities and activities may change, or new ones may be assigned at any time with or without notice. Employment with ITC is at-will. For further information on our equal opportunity protections as part of the employment process, please see **************************************************************** and ***********************************************************************************************
ACCESSIBILITY- Candidates must be able to perform the essential functions of the position satisfactorily and that, if requested, reasonable accommodation may be made to enable employees with disabilities to perform the essential functions of their job, absent undue hardship. If you are a qualified individual with a disability or a disabled veteran, you have the right to request a reasonable accommodation for purposes of participating in the application/selection process with ITC. Please refer to our website ************************** for further information on all our EEO/VEVRAA policies.
Thank you for your interest in ITC Defense!
$74k-101k yearly est. Auto-Apply 33d ago
Manager, Information Security Policy and Controls Governance
UNUM Group 4.4
Information security analyst job in Columbia, SC
Our Fortune 500 company is driving a digital transformation and looking for forward-thinking innovators to disrupt how our industry thinks about and uses technology. As one of the world's leading employee benefits providers, we help millions of people gain affordable access to benefits that help them protect their families, their finances and their futures.
Are you an asker of questions, a solver of problems, and a challenger of the status quo? Our mission is to provide a differentiated customer experience and exceed the expectations people have of technology at any company - not just insurers.
We are seeking individuals to join our team of talented IT professionals who share never-ending passion and an unwavering focus on our customer experience. Team members comfortable working in an agile, fast-paced, and delivery-focused environment thrive in our environment where we value an entrepreneurial spirit and those who challenge the status-quo.
Unum is changing, and we're excited about what's next. Join us.
General Summary:
The Manager - InformationSecurity Policy and Controls Governance is responsible for strategic enhancement and day-to-day operation of key governance, risk, and compliance capabilities, including policy and standards governance, enterprise and application-level risk assessments, and controls management and attestation programs. This role will oversee the full lifecycle of governing documents, manage policy exceptions, coordinate external and regulatory assessments, and ensure strong alignment between security controls and regulatory requirements. The manager will also drive consistent, timely issues management across all domains. This leader will partner closely with stakeholders across the organization to mature processes, strengthen compliance posture, and ensure effective, repeatable execution of GRC activities. They will manage a small to mid-size team of IT security and risk management professionals.
Job Specifications
* Bachelors degree in computer science, or relevant technical experience
* Has 5+ years experience in an IT Risk Management field, or equivalent relevant work experience
* Has a security technology background with strong knowledge of relevant technical security disciplines
* Exhibits courage by taking smart risks and encouraging others to do so; empowers innovative approaches by motivating others to be proactive and resourceful
* Able to effectively coach, mentor, identify, and address skills needs and gaps
* Proficient in methods and techniques for running effective meetings and for understanding and influencing the roles played by participants
* Displays good interpersonal skills at all levels of contact and in a wide variety of situations, able to listen and influence, and to relate to customers in their own language
* Demonstrates the ability to champion change and support teams through change.
* Demonstrates the ability to think critically, challenge conventional thinking and generate and apply unique business insight to create competitive advantage for the organization
* Has solid knowledge of regulations, including, GLPA, HIPAA, GDPR, CCPA, and other cyber security regulatory compliance requirements and related programs
* Has in-depth knowledge of security and control frameworks such as the NIST Cyber Security Framework, NIST SP 800-53, ISO 17799/27001, CobIT, and ITIL
* CRISC, CISSP, CISM, CISA, and other security related certifications are a plus
Principal Duties and Responsibilities
* Oversees and evaluates the delivery and effectiveness of the organizations policy governance, risk assessments, control attestation, and issues management capabilities, taking action to address performance or quality gaps as needed.
* Ensures the team maintains a well‑defined, risk‑aligned backlog of work that advances program maturity and meets regulatory, audit, and business needs.
* Guides team members in prioritizing assessments, policy lifecycle activities, and control-related work based on risk, business value, and regulatory timelines.
* Proactively removes obstacles and operational roadblocks that hinder timely completion of assessments, attestations, and governance processes.
* Partners with business and technology stakeholders to translate security, compliance, and risk management objectives into actionable work items.
* Ensures best‑practice execution, including structured assessment methodologies, clear control documentation, consistent issue tracking, adherence to policy standards, and high‑quality evidence collection.
* Encourages creativity and continuous improvement in maturing governance, assessment, and control processes; fosters a culture of innovation within the team.
* Uses operational metrics, assessment cycle data, and workflow insights to understand team performance and drive process efficiency.
* Partners with leadership to ensure strong talent is in place to support the organization's governance, risk and compliance obligations.
* Mentors, coaches, and motivates team members to elevate their GRC expertise, business partnership skills, and overall performance.
* Identifies skill gaps related to risk frameworks, regulatory requirements, control design, and assessment techniques, ensuring development plans address these needs.
* Promotes cross‑training and shared ownership of GRC functions to reduce single‑points‑of‑failure and increase team resilience.
* While accountable for the team's output, actively cultivates a self‑organizing, autonomous, and collaborative team that consistently demonstrates accountability and continuous improvement.
* Conducts regular 1:1s and development discussions to monitor progress, reinforce strengths, and close skill gaps.
* Collaborates with peers to evaluate the effectiveness of resourcing models, proposing enhancements to better support team operations.
* Maintains a strong understanding of emerging regulatory trends, risk frameworks (e.g., NIST CSF, HIPAA, SOC, ISO), and control expectations to inform program improvements.
* Reinforces disciplined prioritization by ensuring the team focuses on the highest‑value, highest‑risk activities and commitments.
* Designs and operates GRC processes with partner teams' knowledge and needs in mind, ensuring risk governance activities are clear, intuitive, and easy to complete.
#LI-TO1
#LI-MULTI
IN4
Our company is built on helping individuals and families, and this starts with our employees. We want employees to maintain a positive balance, which is why we provide access to the benefits and resources they need to invest in themselves. From our onsite fitness facilities and generous paid time off to employee professional development programs, we are committed to helping employees live and work their best - both inside and outside the office.
Unum is an equal opportunity employer, considering all qualified applicants and employees for hiring, placement, and advancement, without regard to a person's race, color, religion, national origin, age, genetic information, military status, gender, sexual orientation, gender identity or expression, disability, or protected veteran status.
The base salary range for applicants for this position is listed below. Unless actual salary is indicated above in the job description, actual pay will be based on skill, geographical location and experience.
$89,400.00-$183,500.00
Additionally, Unum offers a portfolio of benefits and rewards that are competitive and comprehensive including healthcare benefits (health, vision, dental), insurance benefits (short & long-term disability), performance-based incentive plans, paid time off, and a 401(k) retirement plan with an employer match up to 5% and an additional 4.5% contribution whether you contribute to the plan or not. All benefits are subject to the terms and conditions of individual Plans.
Company:
Unum
$89.4k-183.5k yearly Auto-Apply 13d ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Information security analyst job in Columbia, SC
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**InformationSecurity and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including InformationSecurity, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 60d ago
Security Engineer
Barndoor Ai 4.1
Information security analyst job in Charleston, SC
Who we are We help enterprises unlock the future of AI, and realize untapped potential through a thoughtful approach to access, security, and scalability. We're a growing startup at the forefront of enterprise GenAI infrastructure. We are building a next-generation platform that empowers enterprises to securely adopt and manage advanced AI workflows. We know that successful technology adoption hinges on secure and appropriate access. Our founding team helped shape past technology revolutions - from pioneering secure API Management during the rise of mobile apps to driving enterprise AI adoption across Fortune 100 enterprises.
At the core of all we do is our team. We're made up of builders, creators, and curious minds, on a mission to make AI safer, more responsible. Just as we are thoughtful about our products, we're thoughtful about how we build teams and our culture. We believe with each addition to the team, culture can be enhanced. Take a look at what we value in our About Barndoor page. If this speaks to you, we'd love to hear from you!
How you'll make an impact Security is foundational to everything we build. As our core Security Engineer, you will directly continue to shape the architecture, policies, and culture that scale our secure software. The systems you design will enable our customers-enterprises with complex regulatory and operational needs-to safely deploy AI-powered agents at scale. Your work won't just prevent breaches-it will enable trust, unlock innovation, and differentiate our platform in the market.
What You'll Be Working OnWhile all roles have fluidity, here's a sense of some of what you might work on at any given time.
Core responsibilities and role responsibilities include:
Responsibilities
Audit and strengthen OAuth 2.0 and OIDC token flows across internal proxies, the control plane, and third-party integrations
Identify and mitigate common and emerging threats in delegated authentication workflows
Review and co-design REST, WebSocket, and streaming APIs with strong boundaries, secure defaults, and least-privilege access models
Help define system boundaries for multi-agent, multi-tenant orchestration
Integrate and tune automated CVE, SCA, and IaC scanning tools into CI/CD pipelines
Convert security findings into high-signal engineering tickets with practical remediation paths
Lead lightweight, iterative threat models for new features and services
Define internal security baselines and policies, and mentor others to promote a strong security culture
Favor automation-friendly controls over burdensome manual security processes
Contribute to compliance initiatives such as SOC 2 and ISO 27001, supporting scalable security programs
Leverage deep expertise in OAuth 2.0/OIDC with real-world experience securing authentication flows in production systems
Design secure APIs, review system architectures, and implement scalable authentication and authorization models
Apply hands-on experience with supply chain and container security tools such as Trivy, Snyk, Grype, and Terraform scanning
Demonstrate familiarity with modern identity platforms like Auth0, Okta, and Keycloak, and with Zero Trust models
Requirements
5+ years in application or platform security roles, ideally in high-growth SaaS or cloud-native environments.
Deep expertise in OAuth 2.0/OIDC, including real-world experience securing auth flows in production systems.
Strong track record designing secure APIs, reviewing system architectures, and implementing scalable authN/authZ models.
Hands-on experience with supply chain and container security tools (e.g., Trivy, Snyk, Grype, Terraform scanning).
Familiarity with modern identity platforms (Auth0, Okta, Keycloak) or Zero Trust models.
Proven success contributing to SOC 2, ISO 27001, and overall compliance programs.
Experience working with AI/ML platforms or agent-based architectures.
Comfortable collaborating with infrastructure, product, and legal teams to align security priorities with company goals.
Passion for mentorship, documentation, and building a strong security culture without over-engineering.
Soft Skills That Matter Here
Startup Agility: You thrive in fast-paced, evolving environments and are quick to take initiative without waiting for perfect clarity.
Ownership Mentality: You see a gap and step in-you don't wait to be told what needs securing, you go find it.
Collaborative Spirit: You work well across functions-engineering, product, sales, and beyond-to elevate the entire team's security awareness.
Pragmatic Mindset: You balance ideal security outcomes with real-world constraints, always looking for simple, sustainable solutions.
Mentorship and Influence: You uplift teammates by sharing knowledge and helping others build security into their everyday thinking.
Travel RequirementsTeam connection is an important part of our culture. With a remote-friendly structure, we do require that our team be available to travel for in-person collaboration sessions and meetings. Some roles may have more travel than others. Typical team meetups are every 6-8 weeks, however, this may vary depending on team and business needs. We work to plan out our travel schedules in advance to give as much notice as possible.
Equal Opportunity EmployerWe celebrate diversity and are committed to creating an inclusive environment for all employees. We do not discriminate based on race, color, ancestry, national origin, citizenship, religion or creed, sex (including pregnancy, childbirth, and related conditions), sexual orientation, gender identity or expression, age, marital status, veteran status, disability, genetic information, or any other legally protected status. We believe that diverse teams build better products, and we strive to ensure that our hiring, development, and advancement practices are fair, equitable, and welcoming for everyone.
$81k-112k yearly est. Auto-Apply 60d+ ago
Security Analyst
Msysinc
Information security analyst job in Clover, SC
REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):
6 years informationsecurity experience
Excellent written skills; Proven work experience in process improvement
Ability to identify processes that must be in place for an IT organization to be efficient
Extensive knowledge of IRS Pub 1075, NIST 800-53, ITIL, and CJIS
Process Management
ITIL
Business Analysis experience to include data flow diagrams, requirements specifications, use case scenarios, and acceptance testing.
Ability to work with security technicians to develop detailed procedures;
Ability to quickly grasp complex technical concepts and make them easily understandable in both text and diagrams/flow charts
Ability to deliver high quality documentation with attention to detail.
REQUIRED EDUCATION: Bachelor's Degree in a relevant field of work or equivalent work experience.
Additional Information
All your information will be kept confidential according to EEO guidelines.
$56k-77k yearly est. 60d+ ago
Security Analyst
Novalink Solutions 3.1
Information security analyst job in West Columbia, SC
Providing security and continuous monitoring in a complex network environment across the state of South Carolina. Network includes on -prem and cloud technology supporting 50+ mission critical applications and sites. Daily administration of modern tools including Tenable products, PAN Cortex XDR, Office 365 Security, and MS Defender.
A small security team means every member gets the opportunity to work in different security functions including
incident detection and response, vulnerability management, identity and access management, and physical security.
Must possess excellent written and verbal communication skills as these are employed often with interdepartmental and
external communications in problem solving.
WHY IS THIS POSITION OPEN?
Rebid - 36 -Month tenure reached.
WHAT TYPES OF STAFFING CHALLENGES OR HEADACHES HAVE YOU EXPERIENCED IN THE
PAST? QUALITY OF RESUME?
During the interviews, often we're finding that the candidates don't have the skills or experience that they have outlined
on their resumes, resulting in a waste of time for all parties. We need better vetting from the vendors.
SCOPE OF THE PROJECT:
The Office of the CISO is responsible for securing and monitoring the agency's critical applications and network for the
Department of Social Services. The Department seeks a highly motivated individual who has the skills and experience
needed to support this Office's mission in protecting the Agency's digital environment.
DAILY DUTIES / RESPONSIBILITIES:
Position Description - SecurityAnalyst - Project Lead
• Candidate should be an expert security administration and security continuous monitoring.
• Candidate should be an expert in performing log analysis, risk analysis, incident response processes, and
investigation procedures. This includes experience working in a security operations center and working with
security tools including SIEM, EDR/XDR, IPS/IDS. Candidate should have experience with data blending and
report generation.
Job Duties:
• Planning, implementing, upgrading, and monitoring security measures for the protection of computer network
security and information - both LAN and cloud based.
• Develop and implement security policies, procedures, and standards to protect the organization's data and
assets.
• Monitoring and reporting on SIEM and EDR event data.
• Maintaining records of security events investigated and incident response activities.
• Serve as a Tier III security support on the agency's security team.
• Conduct security assessments of systems, networks, and applications to identify vulnerabilities and risks.
• Work with and provide mentorship to other informationsecurity team members on security strategies,
processes, response, and technologies.
• Respond to security incidents and breaches, and work to mitigate the impact and prevent future incidents.
• Provides incident response support, threat assessment, and computer forensic investigations.
• Coordinate and assist with other Information Technology functions/teams to accomplish agency security
objectives.
• Creating risk analysis documents when reviewing system functional specifications including use cases, activity,
sequence, data flow, collaboration, and diagrams.
• Create security report using complex SQL queries, API integrations, and Power BI.
• Knowledge of blue team tools such as SCAP workbench, vulnerability scanning, and hardening techniques.
• Knowledge of red team tools such as nmap, wireshark, Metasploit, and password crackers.
REQUIRED SKILLS:
(Rank in order of importance)
• 4+ years of experience with SIEM, EDR/XDR, and
IPS/IDS
• 4+ years of experience with security documentation
• 4+ years of experience with C/C++, Python, or
Powershell
• 4+ years of experience with Red/Blue Team
• 4+ years of experience with Office 365 Security
Administration
PREFERRED SKILLS:
(rank in order of Importance)
• Preference will be given to experienced Security
Operation Center (SOC) securityanalyst.
• SQL/Scripting (reports and automation)
experience.
REQUIRED EDUCATION/CERTIFICATIONS:
Bachelor's or higher degree in Computer Science or other
quantitative discipline or equivalent work experience.
PREFERRED EDUCATION/CERTIFICATIONS:
Any of the below.
• CISSP
• CCSP
• SSCP
• CEH
RequirementsRequired Skills
Skill Type
Skill Name
$57k-85k yearly est. 4d ago
Security Analyst - Advanced
Sunshine Enterprise USA LLC
Information security analyst job in Abbeville, SC
Job DescriptionJob Title: SecurityAnalyst - Advanced
Client/Agency: State of South Carolina - DSS (Office of Information Technology) Contract Duration: 12 Months (Extension possible)
Start Date: 02/17/2026 | Deadline 01/23/2026
Schedule: 40 hrs/week | 8:00 AM - 5:00 PM (Day Shift)
Interview Process: 1 Round (Microsoft Teams - Video Required)
Max Bill Rate: $50-$53/hour
Work Authorization: Must be eligible to work in the U.S.
Residency Requirement: Candidate must be a CURRENT South Carolina resident (No relocation allowed)
Security Requirement: Yes
Position Overview
The State of South Carolina - Department of Social Services (DSS), Office of Information Technology, is seeking a highly skilled SecurityAnalyst - Advanced to support enterprise cybersecurity operations. This role will focus on monitoring, analyzing, and responding to security threats across the environment while supporting detection and response tools such as SIEM, EDR/XDR, and IDS/IPS.
The ideal candidate will have strong experience in security documentation, Office 365 security administration, scripting/programming, and working within Red/Blue Team environments.
Key Responsibilities
· Monitor, investigate, and respond to security incidents using SIEM, EDR/XDR, and IDS/IPS tools.
· Perform threat analysis, event correlation, and escalation of security risks and vulnerabilities.
· Support incident response activities including triage, containment, remediation, and reporting.
· Develop and maintain cybersecurity documentation, procedures, and security playbooks.
· Assist with Office 365 Security Administration, including security configurations and monitoring.
· Support proactive threat hunting and security improvement initiatives through Red/Blue Team collaboration.
· Build scripts/tools to improve automation, reporting, and response capabilities using Python, PowerShell, or C/C++.
· Work closely with IT teams to strengthen security posture and implement best practices.
Required Skills & Experience
· 4+ years of experience with SIEM, EDR/XDR, and IPS/IDS
· 4+ years of experience creating and maintaining security documentation
· 4+ years of experience with C/C++, Python, or PowerShell
· 4+ years of experience working with Red/Blue Team methodologies
· 4+ years of experience with Office 365 Security Administration
Preferred Skills
· Prior experience as a Security Operations Center (SOC) SecurityAnalyst
· SQL/Scripting experience for reporting and automation
Preferred Certifications
· CISSP
· CSSP
· SSCP
· CEH
Work Location & Residency Requirement
· Hybrid schedule: 1 day onsite per week in Columbia, SC
· Candidate must be a CURRENT SC resident (No relocation allowed)
Sunshine Enterprise USA is an “Equal Opportunity Employer-Minorities, Females, Veterans and Disabled Persons”
$50-53 hourly 2d ago
Security Analyst
Ask It Consulting
Information security analyst job in Columbia, SC
SecurityAnalyst
Duration : 12+ Months
REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE): Ability to install and use various security tools Application Security Experience in projects involving PCI/NIST security implementations and/or audits
informationsecurity principles and practices
IRS Safeguard Computer Security Evaluation Matrix (SCSEM)
IT Security
Malware
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY CONTROLS
risk/vulnerability assessments
Security - Knowledge in networking, databases, systems and Web operations
SSP
Additional Information
All your information will be kept confidential according to EEO guidelines.
$55k-76k yearly est. 60d+ ago
Security Analyst - Advanced
Sunshine Enterprise Usa
Information security analyst job in Columbia, SC
Job Title: SecurityAnalyst â Advanced
Client\/Agency: State of South Carolina â DSS (Office of Information Technology) Contract Duration: 12 Months (Extension possible)
Start Date: 02\/17\/2026 | Deadline 01\/23\/2026
Schedule: 40 hrs\/week | 8:00 AM â 5:00 PM (Day Shift)
Interview Process: 1 Round (Microsoft Teams â Video Required)
Max Bill Rate: $50\-$53\/hour
Work Authorization: Must be eligible to work in the U.S.
Residency Requirement: Candidate must be a CURRENT South Carolina resident (No relocation allowed)
Security Requirement: Yes
Position Overview
The State of South Carolina â Department of Social Services (DSS), Office of Information Technology, is seeking a highly skilled SecurityAnalyst â Advanced to support enterprise cybersecurity operations. This role will focus on monitoring, analyzing, and responding to security threats across the environment while supporting detection and response tools such as SIEM, EDR\/XDR, and IDS\/IPS.
The ideal candidate will have strong experience in security documentation, Office 365 security administration, scripting\/programming, and working within Red\/Blue Team environments.
Key Responsibilities
· Monitor, investigate, and respond to security incidents using SIEM, EDR\/XDR, and IDS\/IPS tools.
· Perform threat analysis, event correlation, and escalation of security risks and vulnerabilities.
· Support incident response activities including triage, containment, remediation, and reporting.
· Develop and maintain cybersecurity documentation, procedures, and security playbooks.
· Assist with Office 365 Security Administration, including security configurations and monitoring.
· Support proactive threat hunting and security improvement initiatives through Red\/Blue Team collaboration.
· Build scripts\/tools to improve automation, reporting, and response capabilities using Python, PowerShell, or C\/C++.
· Work closely with IT teams to strengthen security posture and implement best practices.
Required Skills & Experience
· 4+ years of experience with SIEM, EDR\/XDR, and IPS\/IDS
· 4+ years of experience creating and maintaining security documentation
· 4+ years of experience with C\/C++, Python, or PowerShell
· 4+ years of experience working with Red\/Blue Team methodologies
· 4+ years of experience with Office 365 Security Administration
Preferred Skills
· Prior experience as a Security Operations Center (SOC) SecurityAnalyst
· SQL\/Scripting experience for reporting and automation
Preferred Certifications
· CISSP
· CSSP
· SSCP
· CEH
Work Location & Residency Requirement
· Hybrid schedule: 1 day onsite per week in Columbia, SC
· Candidate must be a CURRENT SC resident (No relocation allowed)
Sunshine Enterprise USA is an âEqual Opportunity EmployerâMinorities, Females, Veterans and Disabled Personsâ
"}}],"is Mobile":false,"iframe":"true","job Type":"Full time","apply Name":"Apply Now","zsoid":"666380550","FontFamily":"Verdana, Geneva, sans\-serif","job OtherDetails":[{"field Label":"Industry","uitype":2,"value":"Technology"},{"field Label":"Work Experience","uitype":2,"value":"4\-5 years"},{"field Label":"City","uitype":1,"value":"Columbia"},{"field Label":"State\/Province","uitype":1,"value":"South Carolina"},{"field Label":"Zip\/Postal Code","uitype":1,"value":"29620"}],"header Name":"SecurityAnalyst â Advanced","widget Id":"**********00072311","is JobBoard":"false","user Id":"**********00202003","attach Arr":[],"custom Template":"3","is CandidateLoginEnabled":false,"job Id":"**********20750341","FontSize":"12","google IndexUrl":"https:\/\/seu\-usa.zohorecruit.com\/recruit\/ViewJob.na?digest=kJX@DGU@qbph5QFEcbCUnqedJEgmPZSZnE@em.1K4Rg\-&embedsource=Google","location":"Columbia","embedsource":"CareerSite","indeed CallBackUrl":"https:\/\/recruit.zoho.com\/recruit\/JBApplyAuth.do","logo Id":"6zqn0ecd06046e4b149a3a6a61797510edd99"}
$55k-76k yearly est. 1d ago
Security Analyst
Avani Technology Solutions 3.9
Information security analyst job in Mount Pleasant, SC
Job Title : SecurityAnalyst Duration : 12+ Months
Job Description: Daily Duties / Responsibilities: 1. Configure, optimize, AND MAINTAIN current security tools to include network and server monitors as well as vulnerability scanners and Intrusion detection.
2. Review firewall reports and create reports of attack methods and their risk to the agency.
3. Create Sit-rep reports for management.
4. Rework our vulnerability scanning tools to better allow us to identify risk.
Required Skills:
• Nessus vulnerability scanner
• Forescout
• Configuration and maintenance
• Vulnerability analysis and remediation methods
• Data classification and management tools
• Incident handling experience
• SIEM experience - IBM Qradar
• Security policy and procedures
Required Education:
Prefer Bachelor's Degree in Information Technology related discipline with 3 years of experience or minimum 5 years related experience.
Required Certifications:
Not required but Security certifications will be factored in the selection process
Additional Information
All your information will be kept confidential according to EEO guidelines.
$55k-68k yearly est. 60d+ ago
IT Security/Compliance Analyst
Us It Solutions 3.9
Information security analyst job in Columbia, SC
We are from US IT Solutions, an ISO Certified, E-Verify, WMBE Certified organization established in 2005 in CA. O ur company is serving various State, Local and County Departments for over 10 years. USITSOL has been helping clients innovate across all phases of the application lifecycle for over a decade. Some of our prestigious clients are State of CA, State of OR, State of FL, State of NC, State of GA, State of CO, State of VA, State of AR, State of MI, State of OH, State of IL, State of MO, State of MS, California State University, Sacramento Area Sanitation Department, SMUD, Sound Transit, LA Superior Courts, District of Columbia, UMAS, University of Central Florida and Hennepin County and many more.
Job Description
Technical Knowledge:
Hands on experience with any or all of the following technologies would be considered a desirable for this position:
• IBM System 390/zSeries
• Linux and Windows servers
• Network Firewalls, Intrusion Prevention Systems (IPS) , Switching and Routing Infrastructure
• SecurityInformation and Event Management (SIEM) solutions
• Identity and Access Management (IAM) solutions
General Duties and Responsibilities:
1. Perform detailed architectural reviews and risk analysis of security related requests in order to make sound decision making recommendations, such as:
a. Network Design and Information Flow
b. System and Data Access Requests and Reviews
c. Review Firewall Rule Requests (Ports, Protocols and Services)
d. Configuration Management Deviation Requests
e. Vulnerability Management
2. Assist in the design, development, implementation and/or ongoing maturation of SCDHHS security and compliance efforts.
3. Audit and Assess internal agency systems as well as business partner/service provider information system security controls.
4. Utilize Microsoft Office software suite, System Center Service Manager (Ticketing system) eGRC system, Bizagi, Atlassian and other products to document and report on information gathered during Audit and Assessment activities or other OIA efforts.
5. Participate in third-party audits and/or assessments of agency and business partner systems
6. Collaborate with agency leadership, business partners and other parties/stakeholders to provide recommendations for security and compliance risk mitigation efforts.
Qualifications
Required Knowledge/Skills:
1. Must have a strong working knowledge of FISMA, NIST, CMS MARS-E and HIPAA Security and Privacy.
2. 5+ years of experience in I.T. working with and/or auditing IBM System 390/zSeries, Windows, Linux, networking infrastructure and web-based applications.
3. ISC(2), ISACA, SANS GIAC and/or other InformationSecurity Certification is required.
4. Ability to work independently and as a member of a team.
5. Ability to collaborate and coordinate with multiple teams and vendors.
6. Ability to multitask and prioritize tasks effectively in order to meet deadlines.
7. Experience and training with eGRC solutions.
8. Ability to engage diverse audiences of varying technical and non-technical skill-levels to ensure effective alignment of technical requirements to business objectives.
9. Ability to collaborate and coordinate efforts amongst multiple teams and vendors in fulfillment of SCDHHS OIA initiatives.
10. Ability to multitask and prioritize tasks effectively in order to meet deadlines in a results-oriented environment.
11. Must have intermediate to advanced skills in Microsoft Office products (Word, Excel, PowerPoint, Visio) to include working with templates and style guidelines for branding consistency.
12. Keen attention to detail while maintaining the ability to see the big picture.
13. Ability to absorb, retain and communicate complex processes.
14. Ability to accept changes and constructive criticism and remain flexible in dealing with leadership and teams of varying technical and business knowledge.
1. BS degree in computer science or similar discipline
Additional Information
Preferred Requirements/Skills:
1. BS degree in computer science or similar discipline.
2. Prior experience working within a FISMA compliant program.
3. Prior experience in working with any eGRC systems.
4. Prior Health Information Technology experience.
5. Prior ITIL experience in the area of InformationSecurity Management.
REQUIRED EDUCATION/CERTIFICATIONS:
1. ISC(2), ISACA, SANS GIAC and/or other InformationSecurity Certification is required.
PREFERRED EDUCATION/CERTIFICATIONS:
nformation will be kept confidential according to EEO guidelines.
$71k-92k yearly est. 2h ago
IT Analyst
JHM Hotels 4.6
Information security analyst job in Greenville, SC
Title: IT Analyst
Department: IT
Reports to: Vice President, CTO/CIO
Overall Responsibility: To assist in implementing and maintaining IT software and systems and driving business development on existing platforms.
Key Areas of Responsibility:
· Identify ways to improve current IT infrastructure
· Plan and assist on implementation and interfacing of new software
· Maintain existing proprietary software
· Develop and program in .NET and Sharepoint
· Create and maintain SQL databases
· Document and map IT systems and processes
Terms of Employment: Full-time. Willing to consider contractual basis
Qualifications:
· Experience in executing project plans
· Self-motivated to learn new programs/software
· Ability to coordinate amongst different departmental heads
· Experience with .NET and SQL
Hours: Flexible, but generally our office hours are 8am-5pm and 9am-6pm
Pay: Based on experience/qualifications
$66k-90k yearly est. 60d+ ago
IT Security Analyst
Loop Recruiting
Information security analyst job in Columbia, SC
It's fun to work in a company where people truly BELIEVE in what they're doing!
We're committed to bringing passion and customer focus to the business.
The IT SecurityAnalyst will support the Company's ability to protect the confidentiality, integrity, and availability of its physical and information assets by establishing, monitoring, and enforcing system access controls and security solutions.
Responsibilities:
Installs, administers, and maintains security software and solutions, including endpoint security, data loss prevention, security event management (SIEM), IPS/IDS, and other security products.
Monitors enterprise network for security-related issues and suggests remediation.
Responds to requests, provides assistance/technical support, and troubleshoots/resolves problems in a timely manner. Maintains open communication with users regarding questions, problems, project status, and deadlines.
Oversees physical security controls, including security badges and camera systems.
Reviews security logs daily. Analyzes, responds to, and remediates security incidents or suspicious activity.
Qualifications:
Associate's degree in a computer-related field or an equivalent combination of education, training, and experience
Security+ certification required; CCNA: Security and CySA+ certifications desired.
At least two (2) years experience in hands-on IT Security.
Experience working with firewalls, SIEMs, IPS/IDS, TCP/IP, anti-virus, end point protection, DLP, Web Proxy, VPN, public key infrastructure, email filtering, and/or encryption solutions preferred.
$63k-88k yearly est. Auto-Apply 60d+ ago
IT Financial Analyst
Cayuse Holdings
Information security analyst job in Columbia, SC
**JOB TITLE:** IT Financial Analyst **CAYUSE COMPANY:** Cayuse Commercial Services, LLC **SALARY:** $28.00-$35.00/hr **EMPLOYEE TYPE:** Full-Time Hourly Non-Exempt **The Work** The IT Financial Analyst will provide day-to-day support for invoice review and approval processing. The role will also assist IT managers with other financial tasks as assigned.
This position performs all duties and responsibilities in accordance with the Mission, Vision, and Core Values of Cayuse.
**Responsibilities**
**Key Responsibilities**
+ Monitor vendor invoice mailbox
+ Review vendor invoices
+ Match against contract or purchase order
+ Verify invoice for payment or return to vendor
+ Record invoice in general ledger
+ Notify Accounts Payable for vendor payment
+ Work with IT managers on other financial tasks as assigned
+ Respond to assigned tasks in accordance with predefined guidelines.
+ Other duties as assigned.
**Qualifications**
**Qualifications - Here's What You Need**
+ High school diploma or equivalent required
+ Two (2) to five (5) years of experience working in a finance position with focus on billing, invoicing, vendor management.
+ Preference with experience supporting an IT organization
+ Must be able to pass a background check. May require additional background checks as required by projects and/or clients at any time during employment.
**Minimum Skills:**
+ Microsoft Office experience (Work, Excel)
+ Experience with JD Edwards preferred
+ Financial billing, accounts payable experience
+ General accounting
+ Excellent communication skills
+ Experience working with suppliers and third-party vendors
+ Ability to quickly analyze a situation and react appropriately and effectively
+ Effective prioritization skills
+ Self-starter
+ Financial analysis credibility and independent judgment
+ Able to contribute to IT financial planning and operations
**Our Commitment to you / overview of benefits**
+ Medical, Dental and Vision Insurance; Wellness Program
+ Flexible Spending Accounts (Healthcare, Dependent Care, Commuter)
+ Short-Term and Long-Term Disability options
+ Basic Life and AD&D Insurance (Company Provided)
+ Voluntary Life and AD&D options
+ 401(k) Retirement Savings Plan with matching after one year
+ Paid Time Off
**Reports to:** **Program Manager**
**Working Conditions**
+ Professional remote office environment.
+ Must reside in Central or Eastern Time Zone.
+ Must be physically and mentally able to perform duties extended periods of time.
+ Ability to use a computer and other office productivity tools with sufficient speed to meet the demands of this position.
+ Must be able to establish a productive and professional workspace.
+ Must be able to sit for long periods of time looking at computer screen.
+ May be asked to work a flexible schedule which may include holidays.
+ May be asked to travel for business or professional development purposes.
+ May be asked to work hours outside of normal business hours.
**Other Duties:** _Please note this job description is not designed to cover or contain a comprehensive list of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice._
**_Cayuse is an Equal Opportunity Employer. All employment decisions are based on merit, qualifications, skills, and abilities. All qualified applicants will receive consideration for employment in accordance with any applicable federal, state, or local law._**
**Pay Range**
USD $28.00 - USD $35.00 /Hr.
Submit a Referral (*********************************************************************************************************************************
**Can't find the right opportunity?**
Join our Talent Community (********************************************************** or Language Services Talent Community (******************************************************** and be among the first to discover exciting new possibilities!
**Location** _US-_
**ID** _103881_
**Category** _Accounting/Finance_
**Position Type** _Full-Time Hourly Non Exempt_
**Remote** _Yes_
**Clearance Required** _None_
$28-35 hourly 7d ago
AFCENT NOSC - IT Policy Analyst
SMS Data Products Group
Information security analyst job in Sumter, SC
As a dynamic systems integrator, SMS offers proven solutions in engineering, operations, cybersecurity, and digital transformation. With expertise in modernizing and optimizing legacy infrastructure and systems, ensuring operational efficiency, and designing, implementing, and managing secure environments, SMS supports business and mission goals with proficiency, quality, and integrity.
SMS has been serving the advanced information technology needs of the federal government since 1976, delivering talented teams and innovative, cost-effective solutions and services to support our customers' missions for more than 45 years. SMS is headquartered in McLean, Virginia, with offices and on-site operations at customer locations throughout the United States. For additional information on SMS, visit ************
Submit your resume today!
Responsibilities
Provide support to leadership for analysis and development of DoD information technology, cybersecurity, and data policy, processes, and standards.
Interpret and analyze existing and new DoD and U.S. Government policy for applicability and alignment to the AFCENT mission.
Author specific policy documentation and memorandum applicable to AFCENT A6 mission.
Synthesize complex policy and technical matters into clear, effective policy documents written in accordance with U.S. Government “plain language” requirements.
Coordinate formal and informal stakeholder review and revision of AFCENT A6 policy documentation and memorandum.
Participate, support, and represent AFCENT A6 in internal and external policy working groups and meetings.
Provide recommendations to AFCENT A6 customer on new and improved policy artifacts to improve mission enablement and delivery.
Establish and maintain a repository of policy documentation and memorandum and develop processes for sharing new and updated information with supported units.
Train NOSC personnel on the new and updated policies and memorandums as applicable.
Prepare briefings and reports to AFCENT leadership on policy development or major revisions.
Qualifications
Qualifications
B.S. in related field and 5 or more years' relevant experience
Or
7 or more years' relevant experience
Secret clearance level required
Certifications
ITIL Foundation (candidate has up to 60 days to acquire ITIL Foundation certification)
SMS is a dynamic systems integrator established in 1976, delivering talented teams and innovative, cost-effective solutions and services to support our customers' missions for more than 47 years. Our ability to hire and retain quality people in a rapidly evolving IT market is proven through our employee retention rate averaging over 3 years. At SMS, we place a high value on quality of service, customer satisfaction, and best-of-breed policies and practices, resulting in CMMI Level 3 certification and ISO registrations including 9001:2015, 20000-1:2018, and ISO/IEC 27001:2013. SMS is headquartered in McLean, Virginia, with offices and on-site operations at customer locations throughout the United States.
SMS is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
$63k-88k yearly est. Auto-Apply 40d ago
Learn more about information security analyst jobs
How much does an information security analyst earn in Mount Pleasant, SC?
The average information security analyst in Mount Pleasant, SC earns between $55,000 and $107,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.
Average information security analyst salary in Mount Pleasant, SC