Post job

Security engineer jobs in North Charleston, SC

- 50 jobs
All
Security Engineer
Cyber Security Engineer
Cyber Security Analyst
Information Systems Security Officer
Securities Analyst
Information Systems Security Manager
Systems Engineer
Security Systems Specialist
Network Security Engineer
Security Systems Administrator
Information Systems Engineer
Network Engineer
  • System Engineer

    Talentbridge 3.9company rating

    Security engineer job in Charleston, SC

    Systems Engineer 29406, Charleston, South Carolina (Onsite) Full Time Permanent Any Secret Clearance is mandatory Client is seeking a Systems Engineer of Automation for an effort to provide systems engineering and integration of Defence software systems. Must Have: US Citizenship Security Clearance 5+ years' experience in a systems engineer role automating complex IT infrastructure Experience with Microsoft Windows Server and Client Operating Systems Ability to effectively install, configure, and administer in a multi-system and/or multi-application environment Expertise with Microsoft PowerShell is critical as it is heavily leveraged to automate installation, configuration, hardening, and maintenance tasks Ability to automate the installation and configuration of applications Working knowledge and experience with Agile framework and Scrum Knowledge of Linux/Windows OS and networking from a system design perspective Ability to create and test virtualized environments (VMWare, OpenShift, Hyper-V, AWS) Strong documentation and oral communication skills to clearly communicate with all levels of users, engineers, managers, and organizations Ability to work with others in a highly collaborative environment Self-Motivated, strong work ethic and commitment to quality Ability to multi-task and balance multiple goals and priorities We'd be Impressed if You Had: A bachelor's degree in computer science or engineering 10+ years' experience in systems engineering Demonstrated experience with: Git, GitLab, GitLab Pipelines, Artifactory, Confluence and Jira Ansible development (Inventories, Collections, Roles, Modules, Playbooks, etc.) Programming/scripting languages (Bash/Python/HTML/etc) Integrated development environment (IDE, Visual Studio Code) for GIT management and code revision Test Driven Development VMware virtual infrastructure Linux administration and BASH scripting network device configuration and automation Certifications: Microsoft certification (i.e., MCIT, MCSA, MCSE, etc.) CISSP, SANS, ITIL
    $83k-114k yearly est. 4d ago
  • Security Engineer

    HCA Healthcare 4.5company rating

    Security engineer job in Charleston, SC

    **Introduction** Experience the HCA Healthcare difference where colleagues are trusted, valued members of our healthcare team. Grow your career with an organization committed to delivering respectful, compassionate care, and where the unique and intrinsic worth of each individual is recognized. Submit your application for the opportunity below:Security EngineerHCA Healthcare. **This is a hybrid position and requires three days per week in the Division office and/or closest HCA Hospital within the Division.** HCA Healthcare offers a total rewards package that supports the health, life, career and retirement of our colleagues. The available plans and programs include: + Comprehensive medical coverage that covers many common services at no cost or for a low copay. Plans include prescription drug and behavioral health coverage as well as free telemedicine services and free AirMed medical transportation. + Additional options for dental and vision benefits, life and disability coverage, flexible spending accounts, supplemental health protection plans (accident, critical illness, hospital indemnity), auto and home insurance, identity theft protection, legal counseling, long-term care coverage, moving assistance, pet insurance and more. + Free counseling services and resources for emotional, physical and financial wellbeing + 401(k) Plan with a 100% match on 3% to 9% of pay (based on years of service) + Employee Stock Purchase Plan with 10% off HCA Healthcare stock + Family support through fertility and family building benefits with Progyny and adoption assistance. + Referral services for child, elder and pet care, home and auto repair, event planning and more + Consumer discounts through Abenity and Consumer Discounts + Retirement readiness, rollover assistance services and preferred banking partnerships + Education assistance (tuition, student loan, certification support, dependent scholarships) + Colleague recognition program + Time Away From Work Program (paid time off, paid family leave, long- and short-term disability coverage and leaves of absence) + Employee Health Assistance Fund that offers free employee-only coverage to full-time and part-time colleagues based on income. Learn more about Employee Benefits (********************************************************************** **_Note: Eligibility for benefits may vary by location._** We are seeking a Security Engineer for our team to ensure that we continue to provide all patients with high quality, efficient care. Did you get into our industry for these reasons? We are an amazing team that works hard to support each other and are seeking a phenomenal addition like you who feels patient care is as meaningful as we do. We want you to apply! **Job Summary and Qualifications** The IPS Security Engineer will support Division and Facility Network/System Engineers and Administrators by analyzing a wide range of applications, network configurations, and security architectures to ensure the security, integrity, and regulatory compliance of critical information transmitted or stored within the enterprise. Their role is to facilitate the discovery of information and IT-related risks, apply critical thinking to assumptions and develop the right security position/priorities that: first, attain compliance; second, address the material risks to the company while allowing the business to attain its objectives. This position blends cybersecurity engineering with system infrastructure expertise to support risk management, threat mitigation, infrastructure reliability, and compliance with IT and security standards. The IPS Security Engineer will work across multiple domains of information security (i.e. Security and Risk Management, Asset Security, Security Architecture and Engineering, Network Security, Identity and Access Management, Security Assessment and Testing, and Security Operations), providing consultation, assessments, and security/technical guidance to business units and IT teams. **Major Responsibilities:** + Risk Management and Security Consulting + Serves as an internal information security consultant to the enterprise while balancing the needs of the business. + Research and recommend solutions that meet security standards while ensuring functionality for business continuity. + Drive and manage execution of corrective actions to address deficiencies identified during risk assessments. + Translate security standards and regulatory requirements into actionable technical and business requirements. + Lead and support the IPS program by assessing new applications and technologies and ensuring they are implemented in accordance with company standards + Partner with appropriate stakeholders on vulnerability remediation + Engage in Architecture Review Committee discussions to identify and address Third Party solution variance from company standards + Support, coordinate, and manage incident response and investigation activities + Evaluate and recommend security solutions that balance risk mitigation with business functionality + Drive ongoing compliance with IPS policies, standards, and operational procedures + Serve as an internal security consultant across business units + Manage operational processes that monitor and respond to potential security threats **Security Engineering & Architecture** + Evaluate new and proposed security technologies and assist in their integration + Assist in the design and implementation of secure network, application, and system architectures. + Partner with IT colleagues to assure ongoing maturity of IT operational security controls. + Participate in the development and testing of disaster recovery and contingency plans + Security Operations and Threat Management + Partner with corporate and local departments as required to facilitate rapid response to cybersecurity events. + Maintain awareness of emerging threats, vulnerabilities, and mitigation techniques. + Oversee processes for review and approval of security exception requests. **Vendor Systems Security** + Partner with appropriate business and IT leadership to help ensure systems, services, and devices receive appropriate assessments and remediation as part of local on-boarding processes. + Partner with business and IT leadership to ensure proper controls are in place for existing vendor-maintained solutions. + Performs other duties as assigned + Practices and adheres to the "Code of Conduct" philosophy and "Mission and Value Statement." **Education & Experience:** + Bachelor's degree required + Master's degree preferred + 3+ years of experience in a relevant field required + 3+ years of experience in security risk management, information security domains, and/or hospital operations preferred, or equivalent combination of education and/or experience **Licenses, Certifications, & Training:** + CISSP, CISA, CISM, CCNA, MCSA or other relevant certifications in network administration or information security preferred **Required Knowledge, Skills, Abilities, Behaviors:** + Knowledge of supported operating systems (Windows server and VMware ESX), utilities, vendor products, applicable programming languages and scripting, diagnostic techniques, applicable communications protocols, applicable hardware configurations + Must have 1+ years of experience in deploying technically complex infrastructure computing solutions across platforms and components. + Knowledge of virtual technology, such as, Citrix, VMWare ESX, IBM LPARs, VIO servers, and micro partitions. + Knowledge of OS environment running one or more databases including SQL, Oracle, DB2. + Experience in one or more of the following: NetBackup, Data Domain, or CommVault + Applicable communication protocols and hardware configurations + Statistical and analytical tools for systems monitoring + Working knowledge of information security concepts, including risk management, engineering, networking, and cloud. + Understanding of cloud fundamentals and concepts, as well as experience with a popular cloud provider, like Microsoft, Google, or Amazon. + Excellent written and oral skills + Demonstrates a high degree of initiative, dependability, and the ability to work with minimal supervision. + Possesses a sense of responsibility and accountability - one who takes ownership and initiative. + Creative thinker, always looking for a "better way" to deliver value; not stopped or discouraged by adversity. + Maintains professional demeanor, appearance, and positive attitude. + Adaptable and flexible, with the ability to handle ambiguity and sometimes changing priorities. **Travel Required** + The job may require 10-15% travel. (Mostly within the Division) HCA Healthcare has been recognized as one of the World's Most Ethical Companies by the Ethisphere Institute more than ten times. In recent years, HCA Healthcare spent an estimated $3.7 billion in cost for the delivery of charitable care, uninsured discounts, and other uncompensated expenses. "There is so much good to do in the world and so many different ways to do it."- Dr. Thomas Frist, Sr. HCA Healthcare Co-Founder If you find this opportunity compelling, we encourage you to apply for our Security Engineer opening. We promptly review all applications. Highly qualified candidates will be directly contacted by a member of our team. **We are interviewing - apply today!** We are an equal opportunity employer. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
    $77k-92k yearly est. 60d+ ago
  • Security Engineer - Secure Software Development

    Sedgwick 4.4company rating

    Security engineer job in Charleston, SC

    By joining Sedgwick, you'll be part of something truly meaningful. It's what our 33,000 colleagues do every day for people around the world who are facing the unexpected. We invite you to grow your career with us, experience our caring culture, and enjoy work-life balance. Here, there's no limit to what you can achieve. Newsweek Recognizes Sedgwick as America's Greatest Workplaces National Top Companies Certified as a Great Place to Work Fortune Best Workplaces in Financial Services & Insurance Security Engineer - Secure Software Development Security Engineer - Secure Software Development **PRIMARY PURPOSE OF THE ROLE:** To manage the implementation of security measures to protect company data, networks, and computer systems. To focus on executing security fundamentals for threat detection, investigation, and response efforts. **ARE YOU AN IDEAL CANDIDATE?** We are looking for enthusiastic candidates who thrive in a collaborative environment, who are driven to deliver great work, are customer-oriented and are naturally empathetic. **ESSENTIAL RESPONSIBLITIES MAY INCLUDE** + Engineers, implements and monitors security measures for the protection of computer systems, networks and information. + Identifies and defines system security requirements. + Designs computer security architecture and develops detailed cyber security designs. + Prepares and documents standard operating procedures and protocols. + Configures and troubleshoots security infrastructure devices. + Develops technical solutions and new security tools to assist in mitigating security vulnerabilities and automating repeatable tasks. + Leads IT groups and business units as necessary in troubleshooting compatibility issues between security tools and business or productivity programs. + Performs analysis of suspected malicious code and other software or programs and provides written or verbal analysis to management. + Analyzes client and customer needs as required and provides clear and concise reports to leadership. + Works closely with management on assigned projects from inception through implementation ensuring adequate internal communication and user involvement is maintained. **QUALIFICATIONS** Eight (8) years of encryption technologies/algorithms, digital forensics, network topologies, and access controls experience or equivalent combination of educated and experience required. **Skills & Knowledge** + Knowledge of TCP/IP services + Knowledge of audit and compliance + Knowledge of vulnerability management + Knowledge of penetration testing + Knowledge of various operating systems + Knowledge of desktop productivity software + Knowledge of Carbon Black Protection + Knowledge of Symantec Endpoint Protection and host data loss prevention + Knowledge of information technology security frameworks + Excellent oral and written communication skills, including presentation skills + PC literate, including Microsoft Office products + Analytical and interpretive skills + Strong organizational skills + Excellent interpersonal skills + Ability to create and complete comprehensive, accurate and constructive written reports + Ability to work in a team environment + Ability to meet or exceed Performance Competencies **Proficient in Snyk for Application Security:** Demonstrated expertise in integrating Snyk into CI/CD pipelines to proactively identify and remediate vulnerabilities in open-source dependencies, container images, and infrastructure as code. Skilled in leveraging Snyk's developer-first tools to maintain secure codebases, enforce security policies, and ensure compliance with industry standards. Experienced in configuring automated scans, interpreting results, and collaborating with development teams to implement effective remediation strategies, contributing to a robust DevSecOps culture. **TAKING CARE OF YOU** + Career development and promotional growth opportunities + A diverse and comprehensive benefits offering including medical, dental vision, 401K, PTO and more \#LI-TS1 Work environment requirements for entry-level opportunities include - Physical: Computer keyboarding Auditory/visual: Hearing, vision and talking Mental: Clear and conceptual thinking ability; excellent judgement and discretion; ability to meet deadlines Travels as required The statements contained in this document are intended to describe the general nature and level of work being performed by a colleague assigned to this description. They are not intended to constitute a comprehensive list of functions, duties, or local variances. Management retains the discretion to add or to change the duties of the position at any time. Sedgwick is an Equal Opportunity Employer and a Drug-Free Workplace. **If you're excited about this role but your experience doesn't align perfectly with every qualification in the job description, consider applying for it anyway! Sedgwick is building a diverse, equitable, and inclusive workplace and recognizes that each person possesses a unique combination of skills, knowledge, and experience. You may be just the right candidate for this or other roles.** **Sedgwick is the world's leading risk and claims administration partner, which helps clients thrive by navigating the unexpected. The company's expertise, combined with the most advanced AI-enabled technology available, sets the standard for solutions in claims administration, loss adjusting, benefits administration, and product recall. With over 33,000 colleagues and 10,000 clients across 80 countries, Sedgwick provides unmatched perspective, caring that counts, and solutions for the rapidly changing and complex risk landscape. For more, see** **sedgwick.com**
    $78k-100k yearly est. 60d+ ago
  • Principal, Cyber Security Engineer

    Ignite Digital Services

    Security engineer job in Charleston, SC

    Are you searching for an opportunity to take your career to the next level? Ignite Digital Services is a fast-growing digital transformation company serving the national security sector. Our small business applies data science, program management and technical domain expertise to help clients implement data-driven approaches that maximize operational efficiencies. We've redefined what it means to be a leader in our industry by creating and maintaining effective and rewarding working relationships with our clients, partners and internal team members. Our company culture is built upon a team-based approach, which offers continuous opportunities for personal growth and innovation, while providing unmatched value to our clients. Perks of Working at Ignite Digital Services: Competitive pay and benefits, including PTO Education stipends and referral bonuses Compelling work with the U.S. federal government Strong emphasis on volunteer and community engagement Opportunity to shape the future of our industry Supportive colleagues and management who invest in your growth Ignite Digital, has an exciting opportunity for a Principal, Cyber Security Engineer in Charleston, SC to support our client engagements within the federal government. The ideal candidate is a self-starter with strong cybersecurity skills and a strong work ethic. This position serves an important role in supporting a DevSecOps software development program and producing business process improvements. The individual will implement state-of-the-art best cybersecurity practices to ensure software code meets rigorous security audits and testing. Responsibilities: Evaluate, develop, and implement cybersecurity code review solutions within current business processes to optimize efficiencies in collaboration with software developers. Identify methods to collect, analyze, and manage data with the goal of making recommendations to accelerate the Risk Management Framework process within a DevSecOps environment. Conducts vulnerability testing and scanning, incident response, disaster recovery, and business continuity planning and provides analytical support for security policy development and analysis. Evaluated incident response procedures and capabilities through Red Team exercises. Exploited system and network vulnerabilities and misconfigurations for the purpose of gathering data from target or adversary automated information systems or networks and to enable operations and intelligence collection capabilities. Monitored, analyzed, and detected Cyber events and incidents within information systems and networks. Planned, implemented, managed, monitored and upgraded security measures for the protection of the organizations data, systems and networks. Developed security assessment plans for systems, including the objectives, scope, schedule, required documentation, possible risks, and other logistical items for security assessments; developed cloud service provider testing approach from security perspective. Evaluate the performance and applicability of software code review tools against customer and client requirements Foster collaborative business relationships with stakeholders, business partners, and team members Assist in the training and development of the command workforce to increase the ability to produce secure software code Minimum Qualifications: Ability to obtain a DoD security clearance Bachelor of Science Degree in Engineering, Computer Science or Information Systems Fifteen (15) years in cyber security to include: Maintained the information security activities to preserve the availability, integrity, and confidentiality of information resources in compliance with applicable security policies and standards. Experience performing cybersecurity requirements definition, security risk assessment, systems analysis, systems design, security test and evaluation, certification and accreditation, and systems hardening. Demonstrated experience supporting Risk Management Framework (RMF)/ FedRAMP system certification. Demonstrated ability to take initiative and work independently and quickly transition to reassess priorities. Must have Security+ certification Preferred Qualifications: Active DoD security clearance Knowledge of the system development life cycle, software project management approaches and requirements, design and test techniques including experience working in a DevOps/DevSecOps delivery environment Experience in mentoring/training/coaching others in technical concepts Adapts quickly to new situations, is willing to learn new technologies and works well in a team environment, leading individual projects without the need for supervision *Ability to obtain a DoD Government Security Clearance is mandatory for this position* Salary: $150k+ to align with education, certification, & experience Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information. Ignite Digital Services is a Small Business committed to providing exceptional service to government agencies at competitive prices. The capabilities and experience of our staff and our extensive industry relationships distinguish Ignite Digital Services among government contractors. Equal Opportunity Employer/Veterans/Disabled For individuals who would like to request an accommodation, please visit ********************** (CA) or ********************** (SC) or contact Human Resources. Ignite Digital Services will not make any posting or employment decision that does not comply with applicable laws relating to labor and employment, equal employment opportunity, employment eligibility requirements or related matters. Nor will Ignite Digital Services require, in a posting or otherwise, U.S. citizenship or lawful permanent residency in the U.S. as a condition of employment except as necessary to comply with law, regulation, executive order, or federal, state, or local government contract. OFCCP'S Pay Transparency Rule EEO is the Law Poster
    $150k yearly Auto-Apply 60d+ ago
  • Principal, Cyber Security Engineer

    Atlas Executive Consulting

    Security engineer job in Charleston, SC

    Are you searching for an opportunity to take your career to the next level? Ignite Digital Services is a fast-growing digital transformation company serving the national security sector. Our small business applies data science, program management and technical domain expertise to help clients implement data-driven approaches that maximize operational efficiencies. We've redefined what it means to be a leader in our industry by creating and maintaining effective and rewarding working relationships with our clients, partners and internal team members. Our company culture is built upon a team-based approach, which offers continuous opportunities for personal growth and innovation, while providing unmatched value to our clients. Perks of Working at Ignite Digital Services: * Competitive pay and benefits, including PTO * Education stipends and referral bonuses * Compelling work with the U.S. federal government * Strong emphasis on volunteer and community engagement * Opportunity to shape the future of our industry * Supportive colleagues and management who invest in your growth Ignite Digital, has an exciting opportunity for a Principal, Cyber Security Engineer in Charleston, SC to support our client engagements within the federal government. The ideal candidate is a self-starter with strong cybersecurity skills and a strong work ethic. This position serves an important role in supporting a DevSecOps software development program and producing business process improvements. The individual will implement state-of-the-art best cybersecurity practices to ensure software code meets rigorous security audits and testing. Responsibilities: * Evaluate, develop, and implement cybersecurity code review solutions within current business processes to optimize efficiencies in collaboration with software developers. * Identify methods to collect, analyze, and manage data with the goal of making recommendations to accelerate the Risk Management Framework process within a DevSecOps environment. * Conducts vulnerability testing and scanning, incident response, disaster recovery, and business continuity planning and provides analytical support for security policy development and analysis. * Evaluated incident response procedures and capabilities through Red Team exercises. * Exploited system and network vulnerabilities and misconfigurations for the purpose of gathering data from target or adversary automated information systems or networks and to enable operations and intelligence collection capabilities. * Monitored, analyzed, and detected Cyber events and incidents within information systems and networks. * Planned, implemented, managed, monitored and upgraded security measures for the protection of the organizations data, systems and networks. * Developed security assessment plans for systems, including the objectives, scope, schedule, required documentation, possible risks, and other logistical items for security assessments; developed cloud service provider testing approach from security perspective. * Evaluate the performance and applicability of software code review tools against customer and client requirements * Foster collaborative business relationships with stakeholders, business partners, and team members * Assist in the training and development of the command workforce to increase the ability to produce secure software code Minimum Qualifications: * Ability to obtain a DoD security clearance * Bachelor of Science Degree in Engineering, Computer Science or Information Systems * Fifteen (15) years in cyber security to include: Maintained the information security activities to preserve the availability, integrity, and confidentiality of information resources in compliance with applicable security policies and standards. * Experience performing cybersecurity requirements definition, security risk assessment, systems analysis, systems design, security test and evaluation, certification and accreditation, and systems hardening. * Demonstrated experience supporting Risk Management Framework (RMF)/ FedRAMP system certification. * Demonstrated ability to take initiative and work independently and quickly transition to reassess priorities. * Must have Security+ certification Preferred Qualifications: * Active DoD security clearance * Knowledge of the system development life cycle, software project management approaches and requirements, design and test techniques including experience working in a DevOps/DevSecOps delivery environment * Experience in mentoring/training/coaching others in technical concepts * Adapts quickly to new situations, is willing to learn new technologies and works well in a team environment, leading individual projects without the need for supervision * Ability to obtain a DoD Government Security Clearance is mandatory for this position* Salary: $150k+ to align with education, certification, & experience Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information. Ignite Digital Services is a Small Business committed to providing exceptional service to government agencies at competitive prices. The capabilities and experience of our staff and our extensive industry relationships distinguish Ignite Digital Services among government contractors. Equal Opportunity Employer/Veterans/Disabled For individuals who would like to request an accommodation, please visit ********************** (CA) or ********************** (SC) or contact Human Resources. Ignite Digital Services will not make any posting or employment decision that does not comply with applicable laws relating to labor and employment, equal employment opportunity, employment eligibility requirements or related matters. Nor will Ignite Digital Services require, in a posting or otherwise, U.S. citizenship or lawful permanent residency in the U.S. as a condition of employment except as necessary to comply with law, regulation, executive order, or federal, state, or local government contract. OFCCP'S Pay Transparency Rule EEO is the Law Poster Create a Job Alert Interested in building your career at Ignite Digital Services? Get future opportunities sent straight to your email. Create alert
    $150k yearly 60d+ ago
  • Computer Security Analyst

    Haynes 4.5company rating

    Security engineer job in Charleston, SC

    , Inc. Haynes Inc, continues to partner with Department of State (DoS) in Charleston, SC. Our 80+ employees. support the DoS Comptroller and Global Financial Services (CGFS) Center in the areas of: Global Compensation, Information Systems Security (ISSO), and Global Financial Operations. We serve the U.S. Foreign Service, Department of State Civil Service, Foreign Service Retirees, Embassies, and Overseas U.S. Agencies reaching 180 countries and 140 currencies. Haynes, Inc. provides services in: Accounting, Administration, Budget, Travel, Vouchering, Accounts Receivables, Reconciliation, Systems Analysis, Information Systems, Computer Security, Payroll and Compensation, Treasury, Payroll Customer Service, Training, Audits, and Paralegal Analysis. Haynes, Inc. provides our employee family a robust benefits package including: 11 paid Federal holidays, generous Employer Match on your 401k, Paid Time Off, Medical/Dental/Vision Insurance, Flexible Spending Accounts, Life Insurance, Disability, Tuition Reimbursement, free Professional Development & Training Program with 9000+ courses, and more! We thrive on providing a good work/life balance and in creating an inclusive culture where employees feel valued, appreciated, and are rewarded for top performance! Department - Information Systems Security Office (ISSO) in Comptroller and Global Financial Services (CGFS) Description - Will be further updated soon. The Computer Security Analyst supports the CGFS data processing infrastructure by insuring full compliance with all DoS Information Systems Security guidelines and policies regarding hardware, software and telecommunications security. The analyst provides for the (1550) functions including access management, continual monitoring of network and application software activity, including vulnerability assessments, user activity and attempted network penetration. Provides assistance on matters pertaining to information security on Department of State and other U.S. Government agency automated information systems and supporting communications infrastructures, both classified and unclassified, at domestic and at overseas locations; generates detailed draft reports analyzing the physical, administrative, systemic and technical security posture of installations; and makes recommendations to reduce or eliminate security vulnerabilities or risks. Education Requirements: A four year degree is preferred. Technical certification in computer systems security is preferred. Experience in computer security is necessary in areas such as intrusion detection, vulnerability assessments, risk assessments, access management, network monitoring or network diagnostics. Experience with network environments and/or computer security policies and guidelines is a plus. Work Schedule To be hired, the candidate must reside in the state of South Carolina. This position supports a government contract and is subject to the government agency rules and management. Work hours are on site 40 hours per week between the hours of 6:15 am - 6:00 pm. Core working hours are 9:00 am - 3:00 pm. Work Schedule is defined based on the work requirements of our client's division, Global Financial Services. The contract has a non-compensated, 45-minute lunch Monday through Friday. Typically, one year of service in the current job is desired prior to moving into a different job on this contract. Haynes, Inc is an Equal Opportunity Employer. We do not discriminate against any employee or applicant for employment because of race, color, religion, gender, national origin, age, marital status, disability, veteran status, sexual orientation, or other protected status in any of the terms or conditions of employment.
    $64k-81k yearly est. 2d ago
  • Cyber Security Engineer I

    Adapt Forward 4.0company rating

    Security engineer job in Charleston, SC

    Job DescriptionSecurity Engineer North Charleston, SC Minimum of a Secret Clearance Required with ability to obtain Top Secret As a Security Engineer you will The SIEM/SOAR Engineer will be responsible for managing and maintaining the CSSP's Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) systems. Position Requirements and Duties: • Design, implement, and maintain the SIEM and SOAR infrastructure (Elastic and Splunk). • Manage and maintain an enterprise Elastic cluster to support SIEM operations for the CSSP. • Monitor and analyze security events and incidents to protect information assets. • Assist in the development and maintenance of use cases, rules, and alerts for threat detection and response. • Integrate SIEM and SOAR systems with other security tools and data sources. • Automate security operations workflows and incident response procedures using SOAR platforms. • Perform regular system monitoring and health checks to ensure the integrity and availability of SIEM and SOAR systems. • Conduct performance tuning, capacity planning, and scalability assessments for SIEM and SOAR solutions. • Implement and manage data ingestion pipelines for security event data. • Perform regular updates, patches, and upgrades for SIEM and SOAR systems. • Create and maintain documentation for system configurations, processes, and standard operating procedures. • Collaborate with security analysts, operations analysts, incident responders, and other CSSP teams to ensure effective use of SIEM and SOAR capabilities. Required Skills: • 3 years of experience in maintaining an enterprise Elastic cluster • Proficiency in managing and maintaining SIEM and SOAR solutions. • Experience with Elasticsearch Enterprise (including Logstash and Kibana) for SIEM operations. • Strong understanding of security event and incident management processes. • Knowledge of scripting languages (e.g., Python, PowerShell) for automation and integration. • Experience with threat detection and response methodologies. • Extensive experience with Linux Administration of RHEL Operating Systems • Strong experience with networking protocols, solutions, and methodologies Minimum Qualifications: • US Citizen • Possess a high school diploma or GED • Available for on-call after-hours rotational support as needed • Position may require up to 25% travel as needed • OCONUS travel may be required Preferred Qualifications: • Experience with other SIEM platforms (e.g., Splunk). • Knowledge of security frameworks and standards (e.g., MITRE ATT&CK, NIST). • Familiarity with network and endpoint security technologies. • Experience with security incident response and digital forensics. Required Certifications: • 8570 IAT Level II Certification • Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), or Elastic Certified Engineer Company Overview Adapt Forward is a cybersecurity solutions provider for some of the nation's most valuable information systems. Leveraging advanced threat assessment technology and experience in building high-level information security infrastructure, we develop adaptive solutions uniquely tailored to our customers' business objectives to protect sensitive data against sophisticated threats in an increasingly complex security environment. Summary of Benefits Comprehensive Physical Wellness Package, including Medical, Dental, Vision Care, plus Flexible Spending Accounts for health- and dependent-care are included in our standard benefits plan. 401k Retirement Plan with Matching Contribution is immediately available and vested. Annual Training Budget to be used for conference attendance, school enrollment, certification programs, and associated travel expenses. Eleven Federal Holidays, plus three weeks of PTO/vacation/sick leave that accrues at a rate of ten hours per month. Employee Assistance Program: Counseling/legal assistance and other employee well-being programs are also offered. Equal opportunity employer as to all protected groups, including protected veterans and individuals with disabilities. Adapt Forward's Veteran/Disability Affirmative Action Plan narrative section is available for inspection upon request during normal business hours at the Human Resources office and may be requested by contacting Human Resources at *******************. Powered by JazzHR tc84SQksZg
    $74k-102k yearly est. Easy Apply 28d ago
  • Security Engineer

    Barndoor Ai 4.1company rating

    Security engineer job in Charleston, SC

    Who we are We help enterprises unlock the future of AI, and realize untapped potential through a thoughtful approach to access, security, and scalability. We're a growing startup at the forefront of enterprise GenAI infrastructure. We are building a next-generation platform that empowers enterprises to securely adopt and manage advanced AI workflows. We know that successful technology adoption hinges on secure and appropriate access. Our founding team helped shape past technology revolutions - from pioneering secure API Management during the rise of mobile apps to driving enterprise AI adoption across Fortune 100 enterprises. At the core of all we do is our team. We're made up of builders, creators, and curious minds, on a mission to make AI safer, more responsible. Just as we are thoughtful about our products, we're thoughtful about how we build teams and our culture. We believe with each addition to the team, culture can be enhanced. Take a look at what we value in our About Barndoor page. If this speaks to you, we'd love to hear from you! How you'll make an impact Security is foundational to everything we build. As our core Security Engineer, you will directly continue to shape the architecture, policies, and culture that scale our secure software. The systems you design will enable our customers-enterprises with complex regulatory and operational needs-to safely deploy AI-powered agents at scale. Your work won't just prevent breaches-it will enable trust, unlock innovation, and differentiate our platform in the market. What You'll Be Working OnWhile all roles have fluidity, here's a sense of some of what you might work on at any given time. Core responsibilities and role responsibilities include: Responsibilities Audit and strengthen OAuth 2.0 and OIDC token flows across internal proxies, the control plane, and third-party integrations Identify and mitigate common and emerging threats in delegated authentication workflows Review and co-design REST, WebSocket, and streaming APIs with strong boundaries, secure defaults, and least-privilege access models Help define system boundaries for multi-agent, multi-tenant orchestration Integrate and tune automated CVE, SCA, and IaC scanning tools into CI/CD pipelines Convert security findings into high-signal engineering tickets with practical remediation paths Lead lightweight, iterative threat models for new features and services Define internal security baselines and policies, and mentor others to promote a strong security culture Favor automation-friendly controls over burdensome manual security processes Contribute to compliance initiatives such as SOC 2 and ISO 27001, supporting scalable security programs Leverage deep expertise in OAuth 2.0/OIDC with real-world experience securing authentication flows in production systems Design secure APIs, review system architectures, and implement scalable authentication and authorization models Apply hands-on experience with supply chain and container security tools such as Trivy, Snyk, Grype, and Terraform scanning Demonstrate familiarity with modern identity platforms like Auth0, Okta, and Keycloak, and with Zero Trust models Requirements 5+ years in application or platform security roles, ideally in high-growth SaaS or cloud-native environments. Deep expertise in OAuth 2.0/OIDC, including real-world experience securing auth flows in production systems. Strong track record designing secure APIs, reviewing system architectures, and implementing scalable authN/authZ models. Hands-on experience with supply chain and container security tools (e.g., Trivy, Snyk, Grype, Terraform scanning). Familiarity with modern identity platforms (Auth0, Okta, Keycloak) or Zero Trust models. Proven success contributing to SOC 2, ISO 27001, and overall compliance programs. Experience working with AI/ML platforms or agent-based architectures. Comfortable collaborating with infrastructure, product, and legal teams to align security priorities with company goals. Passion for mentorship, documentation, and building a strong security culture without over-engineering. Soft Skills That Matter Here Startup Agility: You thrive in fast-paced, evolving environments and are quick to take initiative without waiting for perfect clarity. Ownership Mentality: You see a gap and step in-you don't wait to be told what needs securing, you go find it. Collaborative Spirit: You work well across functions-engineering, product, sales, and beyond-to elevate the entire team's security awareness. Pragmatic Mindset: You balance ideal security outcomes with real-world constraints, always looking for simple, sustainable solutions. Mentorship and Influence: You uplift teammates by sharing knowledge and helping others build security into their everyday thinking. Travel RequirementsTeam connection is an important part of our culture. With a remote-friendly structure, we do require that our team be available to travel for in-person collaboration sessions and meetings. Some roles may have more travel than others. Typical team meetups are every 6-8 weeks, however, this may vary depending on team and business needs. We work to plan out our travel schedules in advance to give as much notice as possible. Equal Opportunity EmployerWe celebrate diversity and are committed to creating an inclusive environment for all employees. We do not discriminate based on race, color, ancestry, national origin, citizenship, religion or creed, sex (including pregnancy, childbirth, and related conditions), sexual orientation, gender identity or expression, age, marital status, veteran status, disability, genetic information, or any other legally protected status. We believe that diverse teams build better products, and we strive to ensure that our hiring, development, and advancement practices are fair, equitable, and welcoming for everyone.
    $81k-112k yearly est. Auto-Apply 60d+ ago
  • Cyber Security Analyst

    Vets Hired

    Security engineer job in North Charleston, SC

    PRIMARY DUTIES & RESPONSIBILITIES: Conducts regular risk assessments to identify potential vulnerabilities and threats within the AWS IL5 environment Develops strategies for risk mitigation and implements necessary controls to address identified risks Maintains a risk register documenting identified risks and corresponding mitigation actions Ensures AWS configurations align with IL5 security requirements, including encryption, access controls, and network segmentation Implements and enforces compliance with relevant security standards and regulations, such as NIST SP 800-53 and DoD IL5 requirements Monitors AWS configurations for deviations from security baselines and promptly remediates any non-compliant settings Implements strong IAM policies to enforce least privilege access across AWS resources Regularly reviews IAM roles and permissions to ensure alignment with the principle of least privilege Enables multi-factor authentication (MFA) for privileged accounts and sensitive operations Deploys robust monitoring tools to detect unauthorized access attempts, suspicious activities, and security breaches Establishes incident response procedures to promptly respond to security incidents and minimize their impact Conducts post-incident reviews to identify lessons learned and improves incident response processes Implements encryption mechanisms to protect data at rest and in transit within the AWS IL5 environment Regularly reviews encryption policies and key management practices to ensure effectiveness Provides regular security training and awareness programs to AWS IL5 users and administrators Educates users about common cyber threats, phishing attacks, and best practices for secure usage of AWS resources Encourages a culture of security awareness and proactive risk mitigation among all stakeholders Conducts periodic security assessments and audits to evaluate the effectiveness of cyber security controls Identifies areas for improvement and implement enhancements to strengthen the security posture of the AWS IL5 Cloud SCCA Stays abreast of emerging cyber threats, vulnerabilities, and industry best practices to adapt security measures accordingly Travels approximately 3-4 days a quarter, as required DESIRED SKILLS & REQUIREMENTS: RMF experience USMC Cyber experience SAFe (Scaled Agile Framework) experience Working Place: North Charleston, South Carolina, United States Company : Scientific Research Corporation
    $64k-87k yearly est. 60d+ ago
  • Cyber Engineer III

    ITC Defense

    Security engineer job in Charleston, SC

    Location: Charleston, SC Cyber Engineer III Overview: ITC Defense is seeking to hire a Cyber Engineer III in support of U.S. Navy /Air Force CYP (Child Youth Programs) CCTV Lifecycle Support Service program. Responsibilities: Design, implement, and maintain security controls and architectures across networks, systems, and applications in alignment with NIST, ISO 27001, CIS, and Zero Trust principles. Evaluate, integrate, and manage security tools and technologies, including SIEM, SOAR, EDR, IDS/IPS, DLP, and IAM solutions. Lead or support advanced threat detection, incident response, forensic analysis, and remediation activities. Conduct threat modeling, security design reviews, and root cause analysis for new and existing systems. Perform system security assessments, risk analyses, and vulnerability management, including remediation tracking. Coordinate and validate penetration testing efforts and report on security metrics and risk posture. Support compliance, audit, and ATO activities (e.g., NIST 800-53, NIST 800-171, CMMC, FedRAMP). Develop, maintain, and improve security documentation, policies, procedures, and incident response playbooks. Other duties as assigned. Minimum Qualifications: Master's degree in Cybersecurity, Computer Engineering, Electrical Engineering, Electronics Engineering, or Mathematics with a concentration in Computer Science (or equivalent). Minimum of ten (10) years of demonstrated experience preparing, implementing, and ensuring compliance with cybersecurity policies and standards. DoD 8570.1M-compliant certification at one or more of the following levels, as required by PWS tasking: Information Assurance Management (IAM) Level I Information Assurance Technical (IAT) Level I Information Assurance System Architect and Engineer (IASAE) Level I Experience supporting Assessment and Authorization (A&A) activities, including planning, implementation, and ongoing compliance. Experience designing, upgrading, monitoring, and maintaining cybersecurity measures to improve cyber defense and ensure network resiliency. Proven experience assessing cybersecurity vulnerabilities, performing risk analysis, and developing and implementing remediation or risk mitigation strategies. Experience ensuring security controls are in place to protect digital files and electronic infrastructure. Experience responding to and reporting on cybersecurity incidents and security breaches. Preferred Qualifications: Experience with NIST, CMMC, Zero Trust, and cloud security frameworks (AWS, Azure, GCP). Hands-on expertise with security tools (SIEM, SOAR, EDR, IDS/IPS, DLP, IAM) and vulnerability management. Strong analytical, problem-solving, and critical-thinking skills to assess risks and develop solutions. Excellent communication, collaboration, and mentoring abilities for cross-functional teams. Why work at ITC Defense: Employer Supplemented Health Insurance Employer Paid Dental and Vision Insurance Employer Paid Life and AD&D Insurance 3% Biweekly 401(k) Contribution Paid Time Off Tuition and Certification Reimbursement Competitive Salaries with Performance Incentives A positive working environment with supportive teammates and leadership ITC Defense Corp. is committed to creating a diverse environment and is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or protected veteran status. U.S. Citizenship is required for most positions. This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Duties, responsibilities and activities may change, or new ones may be assigned at any time with or without notice. Employment with ITC is at-will. For further information on our equal opportunity protections as part of the employment process, please see **************************************************************** and *********************************************************************************************** ACCESSIBILITY- Candidates must be able to perform the essential functions of the position satisfactorily and that, if requested, reasonable accommodation may be made to enable employees with disabilities to perform the essential functions of their job, absent undue hardship. If you are a qualified individual with a disability or a disabled veteran, you have the right to request a reasonable accommodation for purposes of participating in the application/selection process with ITC. Please refer to our website ************************** for further information on all our EEO/VEVRAA policies. Thank you for your interest in ITC Defense! Powered by JazzHR jPDNgXKqeE
    $74k-101k yearly est. 7d ago
  • Cyber Sec Analyst - ISSO

    Scientific Research Corporation 4.5company rating

    Security engineer job in North Charleston, SC

    The SRC Navy Cryptologic Systems (NCS) Directorate supports a number of US Navy Programs, including the Cryptologic Carry-On Program (CCOP), Ships' Signals Exploitation Equipment (SSEE) Program, and Distributed Common Ground System -- Navy (DCGS-N). We specialize in engineering support, software development, integration, testing, technical writing, Cybersecurity (administration, policy and engineering), production, technical support, warehousing, drafting, repair and management. As an NCS Information Systems Security Officer (ISSO), this position is responsible for supporting the information system owner to complete security assessment, continuous monitoring, and configuration management responsibilities of NCS. Responsibilities include, but are not limited to: Performing monthly compliance assessments using tools, such as Assured Compliance Assessment Solution (ACAS), Collaborative Computing Security Services (CS2) audit files, Secure Content Automation Protocol (SCAP), and McAfee Virus Scan Enterprise, reviewing, documenting, and maintaining all results Verifying patches and virus definitions to the systems using existing automated tools Adhering to predefined configuration management and change management policies and procedures for authorizing software prior to its implementation on systems Ensuring that audit trails (system logs) are reviewed as required; audit records will be maintained for future reference Assessing NCS family of systems in accordance with NIST, NSA and NAVINTEL IA guidance Recommending authorization of systems to the Designated Authorizing Official (DAO) as a certified trusted agent Reporting security incidents in accordance with the command's incident response plan Ensuring systems are operated, used, maintained, and disposed of in accordance with all applicable security policies and practices #LI-LL1 Requirements Must possess an active Top Secret clearance A minimum of five (5) years of cybersecurity experience Must currently hold a DoD 8570-compliant IAT II certification (SSCP or Security+CE with appropriate CE/OS certificate), and IAM II certification (CAP or CASP CE) or be able to obtain within six months CE/OS certificate may include Windows or Linux Experience creating complete ATO packages using Risk Management Framework process Experience with eMASS, SSPs, POA&Ms, VRAM, ACAS/Nessus, XACTA, SCAP, SCC Tool, Benchmarks, and STIG Viewer Successfully complete a NCIS Polygraph within one year of employment Developed communication skills and the ability to express thoughts and ideas clearly and concisely Be a team player, dedicated to program support, capable of multitasking and working several complex and diverse tasks with simultaneous or near simultaneous deadlines Be a self-starter who is accountable and requires minimal direction and supervision Be open to new and innovative ideas Must be able to be appointed ISSO for NCS systems within six months of employment Desired Skills Bachelor's degree in information systems, computer science, or similar AWS Certified Cloud Practitioner Ability to create and modify authorization boundary and data flow diagrams using Microsoft Visio Knowledge of container security, ability to assess container hardening per NIST 800-190, experience assessing container hosting environments, and knowledge of container and code analysis tools such as JFrog Xray, Trivy, and SonarQube Knowledge of GovCloud, Navy Cloud policies and DISA Cloud Computing Security Requirements Guide Experience in a Linux environment is preferred Experience with WSUS, YUM Clearance Information SRC IS A CONTRACTOR FOR THE U.S. GOVERNMENT. THIS POSITION WILL REQUIRE U.S. CITIZENSHIP AS WELL AS A U.S. GOVERNMENT SECURITY CLEARANCE AT THE TOP SECRET / SCI LEVEL with CI POLY ELIGIBILITY Travel Requirements Up to 20% travel may be required About Us Scientific Research Corporation is an advanced information technology and engineering company that provides innovative products and services to government and private industry, as well as independent institutions. At the core of our capabilities is a seasoned team of highly skilled engineers and scientists with multidisciplinary backgrounds. This team is challenged daily to provide cutting edge technology solutions to our clients. SRC offers a generous benefit package, including medical, dental, and vision plans, 401(k) with a company match, life insurance, vacation and sick paid time off accruals starting at 10 days of vacation and 5 days of sick leave annually, 11 paid holidays, tuition reimbursement, and a work environment that encourages excellence and more. For positions requiring a security clearance, selected applicants will be subject to a government security investigation and must meet eligibility requirements for access to classified information. EEO Scientific Research Corporation is an equal opportunity employer that does not discriminate in employment. All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, national origin, disability, protected veteran status, or any other protected characteristic under federal, state or local law. Scientific Research Corporation endeavors to make ************** accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact *************** for assistance. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications.
    $57k-73k yearly est. Auto-Apply 7d ago
  • Enterprise Security System (ESS) Admin

    Strategic Resources 4.3company rating

    Security engineer job in North Charleston, SC

    IT-DOSS Enterprise Security System (ESS) Administrator Strategic Resources, Inc. (SRI) is an international, ISO 9001/20000/27001 Certified, CMMI Level 3 Rated full-service provider with more than 37 years of experience in the Federal, military, and commercial marketplaces. SRI is seeking an experienced ESS Administrator. Overview: The ESS Administrator is the senior technical specialist responsible for managing, configuring, securing, and maintaining Enterprise Security System environment, including servers, databases, storage components, and security platforms that support access control, intrusion detection, and related critical safety systems. This role ensures that ESS services remain operational, resilient, secure, and compliant with requirements. The Administrator supports all system integrations, monitoring, SLA metrics, maintenance windows, and cross-functional coordination needed to deliver reliable enterprise security services under IT-DOSS. Task and Responsibilities: ESS System Administration & Maintenance Application & Systems Integration Cybersecurity & Risk Management Business Continuity & Disaster Recovery Performance Management & Reporting Maintain ESS diagrams, SOPs, configuration baselines, and technical documentation. Update Infrastructure & Systems Documentation by the 15th of each month. Ensure Task/Work Performed Documentation is updated within one business day. Support ITIL-aligned processes including Incident, Problem, Change, Asset, and Knowledge Management. Work with the IT Service Desk Ticketing Administrator to align ESS workflows with ITSM reporting and SLA measurement methods. PPS, After-Hours, and Surge Support Minimum Required Education, Skills, Knowledge, and Abilities: Expertise in server, database, storage, and security technologies needed to design, install, configure, administer, manage, upgrade, troubleshoot, diagnose, test, monitor, and document the ESS environment. Demonstrated, creditable experience supporting enterprise ESS or similar access control/security management platforms. Experience with configuration, optimization, and health management of security system components. Strong understanding of secure architecture principles and system hardening. Preferred Qualifications: Bachelor's degree in IT, Cybersecurity, Computer Engineering, or related field. Experience with federal or DHS security systems environments, including physical access control or intrusion detection systems. Experience with: SQL or other database back-ends used by ESS systems Scripting or automation tools (PowerShell, Python) Storage architectures supporting video or security log retention Familiarity with STIGs, SCAP, and DHS cybersecurity compliance processes. ITIL certification or prior experience supporting ITIL-aligned operations. This job description is intended to outline the general nature and level of work being performed. It is not intended to be a comprehensive list of all responsibilities, duties and skills required of the position. Additional tasks may be assigned as needed.
    $57k-77k yearly est. Auto-Apply 12d ago
  • Information Systems Security Specialist Manager

    Guidehouse 3.7company rating

    Security engineer job in Charleston, SC

    Job Family: Cyber Consulting (Digital) Travel Required: None Clearance Required: Ability to Obtain Top Secret SCI (TS/SCI) What You Will Do: Assist with the preparation and maintenance of process artifacts, traceability documents purposed for compliance with Authority to Operate (ATO) requirements or CSSP Accreditation. Conduct and lead risk assessments and managing risks. Develop and implement cybersecurity policies and procedures. Assisting and developing system security policy and ensuring compliance of change management and configuration control processes. What You Will Need: Minimum of FIVE (5) years of experience with a Bachelor's Degree OR High School Diploma/GED AND SEVEN (7) years of practical experience demonstrating competency in Cybersecurity, Engineering, Test & Evaluation (T&E) or Assessment & Authorization (A&A)/ Certification & Accreditation (C&A) related field. Working knowledge of the Risk Management Framework (RMF) process, and/or include prior experience with the Defense Information Assurance & Certification Accreditation Process (DIACAP), and/or Cyber Security Service Providers (CSSPs). Experience working with Information Assurance tools such as DISA Enterprise Mission Assurance Support Service (eMASS), Assured Compliance Assessment Solution (ACAS), or Host Based Security System (HBSS) may be required to hold an Interim Security Control Assessor qualification. FIVE (5) years of experience supporting network and system security support, Cyber Security Service Providers or Cyber Red Teams or equivalents within the DoD or Federal government. Hold at least one of the following Certifications: Certified Information Systems Security Professional CompTIA Advanced Security Practitioner Certified Information Systems Auditor Certified Ethical Hacker What Would Be Nice To Have: Experience in managing cybersecurity risk management programs and audit support. Conduct and lead risk assessments and managing risks. Proven track record in developing and implementing cybersecurity policies and procedures. What We Offer: Guidehouse offers a comprehensive, total rewards package that includes competitive compensation and a flexible benefits package that reflects our commitment to creating a diverse and supportive workplace. Benefits include: Medical, Rx, Dental & Vision Insurance Personal and Family Sick Time & Company Paid Holidays Position may be eligible for a discretionary variable incentive bonus Parental Leave and Adoption Assistance 401(k) Retirement Plan Basic Life & Supplemental Life Health Savings Account, Dental/Vision & Dependent Care Flexible Spending Accounts Short-Term & Long-Term Disability Student Loan PayDown Tuition Reimbursement, Personal Development & Learning Opportunities Skills Development & Certifications Employee Referral Program Corporate Sponsored Events & Community Outreach Emergency Back-Up Childcare Program Mobility Stipend About Guidehouse Guidehouse is an Equal Opportunity Employer-Protected Veterans, Individuals with Disabilities or any other basis protected by law, ordinance, or regulation. Guidehouse will consider for employment qualified applicants with criminal histories in a manner consistent with the requirements of applicable law or ordinance including the Fair Chance Ordinance of Los Angeles and San Francisco. If you have visited our website for information about employment opportunities, or to apply for a position, and you require an accommodation, please contact Guidehouse Recruiting at ************** or via email at RecruitingAccommodation@guidehouse.com. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodation. All communication regarding recruitment for a Guidehouse position will be sent from Guidehouse email domains including @guidehouse.com or ************************. Correspondence received by an applicant from any other domain should be considered unauthorized and will not be honored by Guidehouse. Note that Guidehouse will never charge a fee or require a money transfer at any stage of the recruitment process and does not collect fees from educational institutions for participation in a recruitment event. Never provide your banking information to a third party purporting to need that information to proceed in the hiring process. If any person or organization demands money related to a job opportunity with Guidehouse, please report the matter to Guidehouse's Ethics Hotline. If you want to check the validity of correspondence you have received, please contact *************************. Guidehouse is not responsible for losses incurred (monetary or otherwise) from an applicant's dealings with unauthorized third parties. Guidehouse does not accept unsolicited resumes through or from search firms or staffing agencies. All unsolicited resumes will be considered the property of Guidehouse and Guidehouse will not be obligated to pay a placement fee.
    $87k-115k yearly est. Auto-Apply 57d ago
  • Network Security Engineer

    Booz Allen Hamilton 4.9company rating

    Security engineer job in Charleston, SC

    The Opportunity: Are you looking for an opportunity to share your experience in networking security to safeguard our nation? On our team, you'll develop and implement security solutions in alignment with security strategy. You'll maintain an awareness of market and technology trends to bring best-of-breed solutions to the client. You'll implement infrastructure security controls, including enhanced detection capabilities and improved event correlation, in large enterprises. You'll perform risk and vulnerability assessments in network, system, and application areas. You'll leverage big data analytics and traditional security event types to identify advanced threats or indicators of compromise. Join us. The world can't wait. You Have: 10+ years of experience solving technical problems related to Networking and Boundary Defense, including Secure Cloud Computing Architectures, CAP, AWS networking, and BIG-IP F5 solutions Experience with AWS networking solutions, including intra-VPC, inter-VPC, and external networking information flow and firewalls, leveraging various AWS services Knowledge of the CAP and process to request exceptions or whitelisting of traffic Ability to develop the overall DevSecOps and Continuous Integration and Continuous Delivery (CI/CD) architecture of complex systems Ability to conduct administration of BIG-IP F5, including load balancing, web application firewall and security policies, and authentication and authorization Top Secret clearance IAT Level II Certification such as CCNA, CySA+, CND, or Security+ Certification Nice If You Have: Experience coordinating across cross-functional teams to remove impediments to CI/CD in order to accelerate capability delivery and increase the quality and reliability of operational systems Experience with project management support in support of a DoD contract or task order Clearance: Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Top Secret clearance is required. Compensation At Booz Allen, we celebrate your contributions, provide you with opportunities and choices, and support your total well-being. Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care. Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values. Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen's benefit programs. Individuals that do not meet the threshold are only eligible for select offerings, not inclusive of health benefits. We encourage you to learn more about our total benefits by visiting the Resource page on our Careers site and reviewing Our Employee Benefits page. Salary at Booz Allen is determined by various factors, including but not limited to location, the individual's particular combination of education, knowledge, skills, competencies, and experience, as well as contract-specific affordability and organizational requirements. The projected compensation range for this position is $61,900.00 to $141,000.00 (annualized USD). The estimate displayed represents the typical salary range for this position and is just one component of Booz Allen's total compensation package for employees. This posting will close within 90 days from the Posting Date. Identity Statement As part of the application process, you are expected to be on camera during interviews and assessments. We reserve the right to take your picture to verify your identity and prevent fraud. Work Model Our people-first culture prioritizes the benefits of flexibility and collaboration, whether that happens in person or remotely. If this position is listed as remote or hybrid, you'll periodically work from a Booz Allen or client site facility. If this position is listed as onsite, you'll work with colleagues and clients in person, as needed for the specific role. Commitment to Non-Discrimination All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, local, or international law.
    $61.9k-141k yearly Auto-Apply 60d+ ago
  • Information System Security Officer

    Ifas LLC

    Security engineer job in Charleston, SC

    The U.S. Department of State (DoS), Comptroller and Global Financial Services (CGFS), Chief Information Officer, Information Systems Security Office (CGFS/CIO/ISSO) requires the contractor to provide analytical and coordination support in the Information Systems Security Office (ISSO) as a Security Analyst in applying interrelationships of multiple Cybersecurity specialties; IT architecture; new IA developments and applications; emerging technologies and their applications to business processes; IT security concepts, standards, and methods; project management principles and methods. Minimum Requirements Four-year degree in computer science, business, or closely related area. Technical certification in computer systems security and a minimum of 5 years' experience in intrusion detection, vulnerability assessments, and network diagnostics. Experience with DoS computer security policies and guidelines. Security+ certification is required; CompTIA+ certification is preferred. Job Responsibilities CGFS Charleston ISSO Information Assurance and Risk Management Framework (RMF). User creation and conditional email assignment of user and administrative accounts on CGFS General Support Systems. Active role in network and systems design to ensure that appropriate systems security policies and procedures are contemplated and introduced into designs at the outset. Assess breaches of security to determine their impact on system operations and the confidentiality, integrity, and reliability of the information stored and manipulated within the system. Applies findings to the development of corrective measures and user awareness. Creation and maintenance of users for CGFS Financial Applications. Creation and updating of Treasury Keys for supported applications. Storing and distribution of classified peripheral devices. Creation and maintenance of network drive folder file permissions. Documenting visiting Government and Non-Government visitor's laptops. Support internal and external access management audits. Create and maintain ISO 9001 documentation for engineering and access management efforts Ability to communicate technical as well as non-technical information clearly, both orally and in writing. Brief and maintain documentation for all users on automated information systems (AIS). SharePoint development and maintenance. Provide tier III support for all Information Systems Security. Create, modify, and delete user accounts on automated information systems. Security Clearance Requirement All contractors supporting this Department must be able to either possess or obtain a security clearance of “Top Secret/SCI.” Important note to consider : A Secret Clearance will open a lot of other doors for your career in the Government to include possibilities of being hired directly. Work Schedule The employee will work an 8-hour shift between the hours of 6:15 am to 6:00 pm with a non-compensated 45-minute lunch (See your Project Manager for work schedule and department policies). Additional hours may be required and must be authorized by your Project Manager and DoS Management. This position requires 5 days on-site. Software Systems Utilized: Basic knowledge and experience with Windows 2012/2016/or future elaborations Server network environment. Basic knowledge and experience on personal computers running Windows 10 or future elaborations workstation in a Windows network environment. Experience with PC workstation operations including word processing, spreadsheets, and electronic mail, as well as knowledge of Windows 10 or future elaborations system internals such as the registry. Ability to communicate technical as well as non-technical information clearly, both orally and in writing. Formal Job-Specific Training Requirements: IA 201 - Information Assurance for System Administrators Our Most Successful Employees in this Position Demonstrate: An understanding of the mission and business functions of the organization. An ability to build relationships with key personnel who have authority or ability to ensure compliance with security laws, regulations, guidance, and requirements. An ability to troubleshoot issues while maintaining appropriate operational security posture.
    $60k-82k yearly est. Auto-Apply 47d ago
  • Information System Security Officer

    IFAS LLC

    Security engineer job in Charleston, SC

    Job Description The U.S. Department of State (DoS), Comptroller and Global Financial Services (CGFS), Chief Information Officer, Information Systems Security Office (CGFS/CIO/ISSO) requires the contractor to provide analytical and coordination support in the Information Systems Security Office (ISSO) as a Security Analyst in applying interrelationships of multiple Cybersecurity specialties; IT architecture; new IA developments and applications; emerging technologies and their applications to business processes; IT security concepts, standards, and methods; project management principles and methods. Minimum Requirements Four-year degree in computer science, business, or closely related area. Technical certification in computer systems security and a minimum of 5 years' experience in intrusion detection, vulnerability assessments, and network diagnostics. Experience with DoS computer security policies and guidelines. Security+ certification is required; CompTIA+ certification is preferred. Job Responsibilities CGFS Charleston ISSO Information Assurance and Risk Management Framework (RMF). User creation and conditional email assignment of user and administrative accounts on CGFS General Support Systems. Active role in network and systems design to ensure that appropriate systems security policies and procedures are contemplated and introduced into designs at the outset. Assess breaches of security to determine their impact on system operations and the confidentiality, integrity, and reliability of the information stored and manipulated within the system. Applies findings to the development of corrective measures and user awareness. Creation and maintenance of users for CGFS Financial Applications. Creation and updating of Treasury Keys for supported applications. Storing and distribution of classified peripheral devices. Creation and maintenance of network drive folder file permissions. Documenting visiting Government and Non-Government visitor's laptops. Support internal and external access management audits. Create and maintain ISO 9001 documentation for engineering and access management efforts Ability to communicate technical as well as non-technical information clearly, both orally and in writing. Brief and maintain documentation for all users on automated information systems (AIS). SharePoint development and maintenance. Provide tier III support for all Information Systems Security. Create, modify, and delete user accounts on automated information systems. Security Clearance Requirement All contractors supporting this Department must be able to either possess or obtain a security clearance of “Top Secret/SCI.” Important note to consider : A Secret Clearance will open a lot of other doors for your career in the Government to include possibilities of being hired directly. Work Schedule The employee will work an 8-hour shift between the hours of 6:15 am to 6:00 pm with a non-compensated 45-minute lunch (See your Project Manager for work schedule and department policies). Additional hours may be required and must be authorized by your Project Manager and DoS Management. This position requires 5 days on-site. Software Systems Utilized: Basic knowledge and experience with Windows 2012/2016/or future elaborations Server network environment. Basic knowledge and experience on personal computers running Windows 10 or future elaborations workstation in a Windows network environment. Experience with PC workstation operations including word processing, spreadsheets, and electronic mail, as well as knowledge of Windows 10 or future elaborations system internals such as the registry. Ability to communicate technical as well as non-technical information clearly, both orally and in writing. Formal Job-Specific Training Requirements: IA 201 - Information Assurance for System Administrators Our Most Successful Employees in this Position Demonstrate: An understanding of the mission and business functions of the organization. An ability to build relationships with key personnel who have authority or ability to ensure compliance with security laws, regulations, guidance, and requirements. An ability to troubleshoot issues while maintaining appropriate operational security posture.
    $60k-82k yearly est. 18d ago
  • Security Analyst

    Avani Technology Solutions 3.9company rating

    Security engineer job in Mount Pleasant, SC

    Job Title : Security Analyst Duration : 12+ Months Job Description: Daily Duties / Responsibilities: 1. Configure, optimize, AND MAINTAIN current security tools to include network and server monitors as well as vulnerability scanners and Intrusion detection. 2. Review firewall reports and create reports of attack methods and their risk to the agency. 3. Create Sit-rep reports for management. 4. Rework our vulnerability scanning tools to better allow us to identify risk. Required Skills: • Nessus vulnerability scanner • Forescout • Configuration and maintenance • Vulnerability analysis and remediation methods • Data classification and management tools • Incident handling experience • SIEM experience - IBM Qradar • Security policy and procedures Required Education: Prefer Bachelor's Degree in Information Technology related discipline with 3 years of experience or minimum 5 years related experience. Required Certifications: Not required but Security certifications will be factored in the selection process Additional Information All your information will be kept confidential according to EEO guidelines.
    $55k-68k yearly est. 60d+ ago
  • Cyber Security Engineer I

    Adapt Forward 4.0company rating

    Security engineer job in North Charleston, SC

    Security Engineer North Charleston, SC Minimum of a Secret Clearance Required with ability to obtain Top Secret As a Security Engineer you will The SIEM/SOAR Engineer will be responsible for managing and maintaining the CSSP's Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) systems. Position Requirements and Duties: • Design, implement, and maintain the SIEM and SOAR infrastructure (Elastic and Splunk). • Manage and maintain an enterprise Elastic cluster to support SIEM operations for the CSSP. • Monitor and analyze security events and incidents to protect information assets. • Assist in the development and maintenance of use cases, rules, and alerts for threat detection and response. • Integrate SIEM and SOAR systems with other security tools and data sources. • Automate security operations workflows and incident response procedures using SOAR platforms. • Perform regular system monitoring and health checks to ensure the integrity and availability of SIEM and SOAR systems. • Conduct performance tuning, capacity planning, and scalability assessments for SIEM and SOAR solutions. • Implement and manage data ingestion pipelines for security event data. • Perform regular updates, patches, and upgrades for SIEM and SOAR systems. • Create and maintain documentation for system configurations, processes, and standard operating procedures. • Collaborate with security analysts, operations analysts, incident responders, and other CSSP teams to ensure effective use of SIEM and SOAR capabilities. Required Skills: • 3 years of experience in maintaining an enterprise Elastic cluster • Proficiency in managing and maintaining SIEM and SOAR solutions. • Experience with Elasticsearch Enterprise (including Logstash and Kibana) for SIEM operations. • Strong understanding of security event and incident management processes. • Knowledge of scripting languages (e.g., Python, PowerShell) for automation and integration. • Experience with threat detection and response methodologies. • Extensive experience with Linux Administration of RHEL Operating Systems • Strong experience with networking protocols, solutions, and methodologies Minimum Qualifications: • US Citizen • Possess a high school diploma or GED • Available for on-call after-hours rotational support as needed • Position may require up to 25% travel as needed • OCONUS travel may be required Preferred Qualifications: • Experience with other SIEM platforms (e.g., Splunk). • Knowledge of security frameworks and standards (e.g., MITRE ATT&CK, NIST). • Familiarity with network and endpoint security technologies. • Experience with security incident response and digital forensics. Required Certifications: • 8570 IAT Level II Certification • Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), or Elastic Certified Engineer Company Overview Adapt Forward is a cybersecurity solutions provider for some of the nation's most valuable information systems. Leveraging advanced threat assessment technology and experience in building high-level information security infrastructure, we develop adaptive solutions uniquely tailored to our customers' business objectives to protect sensitive data against sophisticated threats in an increasingly complex security environment. Summary of Benefits Comprehensive Physical Wellness Package, including Medical, Dental, Vision Care, plus Flexible Spending Accounts for health- and dependent-care are included in our standard benefits plan. 401k Retirement Plan with Matching Contribution is immediately available and vested. Annual Training Budget to be used for conference attendance, school enrollment, certification programs, and associated travel expenses. Eleven Federal Holidays, plus three weeks of PTO/vacation/sick leave that accrues at a rate of ten hours per month. Employee Assistance Program: Counseling/legal assistance and other employee well-being programs are also offered. Equal opportunity employer as to all protected groups, including protected veterans and individuals with disabilities. Adapt Forward's Veteran/Disability Affirmative Action Plan narrative section is available for inspection upon request during normal business hours at the Human Resources office and may be requested by contacting Human Resources at *******************.
    $74k-102k yearly est. Auto-Apply 31d ago
  • Cyber Engineer III

    ITC Defense

    Security engineer job in Charleston, SC

    Cyber Engineer III Overview: ITC Defense is seeking to hire a Cyber Engineer III in support of U.S. Navy /Air Force CYP (Child Youth Programs) CCTV Lifecycle Support Service program. Responsibilities: Design, implement, and maintain security controls and architectures across networks, systems, and applications in alignment with NIST, ISO 27001, CIS, and Zero Trust principles. Evaluate, integrate, and manage security tools and technologies, including SIEM, SOAR, EDR, IDS/IPS, DLP, and IAM solutions. Lead or support advanced threat detection, incident response, forensic analysis, and remediation activities. Conduct threat modeling, security design reviews, and root cause analysis for new and existing systems. Perform system security assessments, risk analyses, and vulnerability management, including remediation tracking. Coordinate and validate penetration testing efforts and report on security metrics and risk posture. Support compliance, audit, and ATO activities (e.g., NIST 800-53, NIST 800-171, CMMC, FedRAMP). Develop, maintain, and improve security documentation, policies, procedures, and incident response playbooks. Other duties as assigned. Minimum Qualifications: Master's degree in Cybersecurity, Computer Engineering, Electrical Engineering, Electronics Engineering, or Mathematics with a concentration in Computer Science (or equivalent). Minimum of ten (10) years of demonstrated experience preparing, implementing, and ensuring compliance with cybersecurity policies and standards. DoD 8570.1M-compliant certification at one or more of the following levels, as required by PWS tasking: Information Assurance Management (IAM) Level I Information Assurance Technical (IAT) Level I Information Assurance System Architect and Engineer (IASAE) Level I Experience supporting Assessment and Authorization (A&A) activities, including planning, implementation, and ongoing compliance. Experience designing, upgrading, monitoring, and maintaining cybersecurity measures to improve cyber defense and ensure network resiliency. Proven experience assessing cybersecurity vulnerabilities, performing risk analysis, and developing and implementing remediation or risk mitigation strategies. Experience ensuring security controls are in place to protect digital files and electronic infrastructure. Experience responding to and reporting on cybersecurity incidents and security breaches. Preferred Qualifications: Experience with NIST, CMMC, Zero Trust, and cloud security frameworks (AWS, Azure, GCP). Hands-on expertise with security tools (SIEM, SOAR, EDR, IDS/IPS, DLP, IAM) and vulnerability management. Strong analytical, problem-solving, and critical-thinking skills to assess risks and develop solutions. Excellent communication, collaboration, and mentoring abilities for cross-functional teams. Why work at ITC Defense: Employer Supplemented Health Insurance Employer Paid Dental and Vision Insurance Employer Paid Life and AD&D Insurance 3% Biweekly 401(k) Contribution Paid Time Off Tuition and Certification Reimbursement Competitive Salaries with Performance Incentives A positive working environment with supportive teammates and leadership ITC Defense Corp. is committed to creating a diverse environment and is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or protected veteran status. U.S. Citizenship is required for most positions. This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Duties, responsibilities and activities may change, or new ones may be assigned at any time with or without notice. Employment with ITC is at-will. For further information on our equal opportunity protections as part of the employment process, please see **************************************************************** and *********************************************************************************************** ACCESSIBILITY- Candidates must be able to perform the essential functions of the position satisfactorily and that, if requested, reasonable accommodation may be made to enable employees with disabilities to perform the essential functions of their job, absent undue hardship. If you are a qualified individual with a disability or a disabled veteran, you have the right to request a reasonable accommodation for purposes of participating in the application/selection process with ITC. Please refer to our website ************************** for further information on all our EEO/VEVRAA policies. Thank you for your interest in ITC Defense!
    $74k-101k yearly est. Auto-Apply 6d ago
  • Information Security System Specialist

    Vets Hired

    Security engineer job in Charleston, SC

    We are seeking an experienced cybersecurity professional with expertise in Risk Management Framework (RMF), accreditation processes, and information assurance tools. The ideal candidate will have a strong background in system and network security, support for DoD or Federal government programs, and hold required certifications such as IAT III. This role requires both technical and policy knowledge to ensure compliance, maintain operational security postures, and support mission-critical cybersecurity functions. Requirements / Responsibilities: Experience in Cybersecurity, Engineering, T&E, or A&A/C&A related field. Working knowledge of RMF, DIACAP, and/or CSSPs. Experience with Information Assurance tools such as DISAs eMASS, ACAS, or HBSS (may be required for Interim SCA qualification). Familiarity with security policies and guidance documents for preparation and maintenance of compliance artifacts and traceability documents. Ability to evaluate security solutions for classified information processing. Experience supervising or maintaining the operational security posture for information systems/programs. Experience developing or assisting with system security policy, ensuring compliance with change management and configuration control processes. Experience supporting network/system security, Cyber Security Service Providers (CSSPs), or Cyber Red Teams within DoD/Federal government, including: Vulnerability Analysis Network Security Monitoring Incident Response / Forensics Penetration Testing / Red Teaming Possesses certifications in compliance with DoD 8570 categories and DoD 8140 manual, such as: CND Auditor, CND Analyst, CNDSP Manager, CND Incident Responder, CND Infrastructure Support, IASAE I or IASAE II Technical training in Cybersecurity, Information Assurance, or Information Technology. Must hold IAT III certification. Education: Bachelors degree in a technical or managerial discipline OR High School Diploma/GED. Must meet the latest Cybersecurity workforce certification/training requirements in accordance with DoD 8570.1M and subsequent DoD 8140 manual, as applicable. Equal Opportunity Statement: This employer is an Equal Opportunity Employer. Qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Working Place: Charleston, South Carolina, United States Company : 2025 Oct 16th Virtual Fair - Fusion Technology
    $53k-84k yearly est. 60d+ ago

Learn more about security engineer jobs

How much does a security engineer earn in North Charleston, SC?

The average security engineer in North Charleston, SC earns between $61,000 and $113,000 annually. This compares to the national average security engineer range of $77,000 to $141,000.

Average security engineer salary in North Charleston, SC

$83,000
Job type you want
Full Time
Part Time
Internship
Temporary