Information Technology Security Manager
Security engineer job in Fort Mill, SC
CULTURE SNAPSHOT:
Broad River Retail is an organization of integrity, diversity and culture working together for the purpose of ‘
Furnishing Life's Best Memories'
. At Broad River, we call all our employees “Memory Makers.” We do this because we know everyone that works for our Company has the power to make positive memories not only for our Guests, but also for their families, co-workers, and communities.
We take pride in training and developing our teams so that they can provide a premier customer experience to every Guest. Our Memory Makers are the driving force that has led us to being the largest and fastest growing Ashley licensee in the U.S. and landing us on the Top Places to Work list two years in a row in our industry.
AT A GLANCE:
The IT Security Manager reports directly to the VP of IT/BI and is part of the IT/BI Department. The IT Security Manager is responsible for safeguarding the organization's digital assets by managing and monitoring, detecting, and responding to security threats. This role involves conducting risk assessments, managing incident responses, and implementing security protocols to ensure the integrity, confidentiality, and availability of enterprise systems and data.
DAY IN THE LIFE AS THIS MEMORY MAKER:
Monitor security networks and systems for breaches or suspicious activity.
Respond to security incidents and conduct thorough investigations.
Perform vulnerability assessments and penetration testing.
Develop and implement security measures and protocols.
Analyze security alerts and determine appropriate response actions.
Collaborate with IT teams to ensure secure system configurations.
Prepare regular security reports for management.
Conduct security awareness training for staff.
Lead and manage security-related projects and initiatives.
WHAT YOU'LL NEED TO SUCCEED:
Bachelor's degree in Computer Science, Information Technology, or related field.
5+ years of experience in cybersecurity or related roles.
3+ years of Information Technology Management or related field
Certifications such as CISSP, CISM, CEH, or GIAC preferred.
Strong understanding of cybersecurity frameworks (e.g., NIST, ISO-27001, PCI-DSS).
Experience with SIEM, IDS/IPS, firewalls, and endpoint protection tools.
Excellent analytical, problem-solving, and communication skills.
Ability to lead security-related projects and initiatives.
Clearly convey ideas, expectations, and feedback to teams, ensuring transparency and alignment across all levels.
Build strong relationships and a positive work culture.
Address and resolve conflicts within the team, mediating differences and finding mutually beneficial solutions.
Inspire and encourage team members, fostering a sense of purpose and driving performance toward shared goals.
Respond to change with flexibility and a positive outlook, guiding teams through transitions and unforeseen challenges.
Distribute tasks effectively based on team strengths, ensuring optimal workload balance and empowering others to take ownership.
Mentor and provide constructive feedback to help team members grow, enhancing their skills and career development.
WORKPLACE ENVIRONMENT:
While performing the duties of this job the employee is:
Prolonged periods sitting at a desk and working on a computer.
Must be able to lift up to 15 pounds at a time.
WORK SCHEDULE OUTLINED ON SITE, HYBRID, REMOTE WITH EXPECTATIONS
Ability to work independently, as well as, in a collaborative team environment within an office setting.
Physical requirements such as extended periods of sitting and computer use may be required.
Physical requirements such as extended periods of standing may be required.
Ability to communicate effectively verbally, in writing, and/or electronically.
Ability to use logical reasoning for simple and complex problem solving.
Travel up to 20% of your time.
In accordance with the Americans with Disabilities Act (ADA), reasonable accommodations may be made to empower individuals with disabilities to undertake the essential duties and responsibilities of the position.
MEMORY MAKER PERKS & BENEFITS:
Salary Range based on background, skill, and experience
Medical, dental, vision, and life insurance options
Paid time off and 401K matching contribution
Employee discount (40%) at BRR locations
Internal Opportunities for career growth and advancement
OUR COMMITMENT TO YOU:
Broad River Retail is committed to creating a place where everyone feels respected, valued, and able to reach their full potential. Regardless of race, gender, religion, sexual orientation, age, disability, or if you're parenting the next generation of Memory Makers, we firmly believe our work is at its best when everyone feels free to be their most authentic self.
Network Security Engineer
Security engineer job in South Carolina
About Analog Devices Analog Devices, Inc. (NASDAQ: ADI ) is a global semiconductor leader that bridges the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies into solutions that help drive advancements in digitized factories, mobility, and digital healthcare, combat climate change, and reliably connect humans and the world. With revenue of more than $9 billion in FY24 and approximately 24,000 people globally, ADI ensures today's innovators stay Ahead of What's Possible. Learn more at ************** and on LinkedIn and Twitter (X).
Network Security Engineer
Cyber Defence Job Req:
Role Overview
The Network Security Engineer is responsible for designing, implementing, and maintaining secure network infrastructures. This role ensures the organisation's firewalls, VPNs, and network security controls are properly configured, monitored, and compliant with industry standards. We are looking for a proactive and solution orientated professional with excellent problem-solving and analytical skills. You will want to stay current with emerging threats, technologies, and best practices and will have the ability to think strategically and act tactically. You will be the authority on keeping an Analog Devices' computer networks safe from threats and ensuring secure connectivity for critical business operations.
Key Responsibilities
* Provide governance for the configuration, management, and optimisation firewalls, IDS/IPS, and network security appliances.
* Perform firewall posture management, including rule audits, cleanup, and compliance checks.
* Govern the implementation and maintenance of network segmentation, secure remote access, and VPN solutions.
* Monitor network traffic for anomalies and respond to security incidents.
* Develop and enforce network security policies and standards. Ensure compliance with security standards and regulations.
* Conduct vulnerability assessments and support patching of network devices.
* Automate routine tasks using scripts or security orchestration tools.
* Implement cloud security controls across AWS, Azure, and GCP, applying Zero Trust principles and securing hybrid network architectures for resilience
* Establish reporting for ADIs network security posture and help to develop plans for continuous improvement
* Develop and maintain detection logic leveraging network telemetry (e.g., NetFlow, DNS logs, proxy logs) to identify anomalous or malicious activity.
* Collaborate with SOC teams to create and update run-books for network-related incidents, ensuring consistent and efficient response workflows.
* Continuously improve detection coverage by analysing threat trends and incorporating new indicators into network monitoring tools
Essential
* More than three (3) years' experience in a network security engineering role
* An in-depth understanding of networking protocols and technologies
* Demonstrable hands-on experience with security tools and platforms: Network Detection & Response, Secure Web Gateways/Proxies, Intrusion detection and prevention systems (IDS/IPS), Enterprise firewalls and SIEM platforms and vulnerability management tools
* Experience with cloud security for AWS, Azure, or GCP and securing cloud networking components.
* Familiarity with security frameworks such as NIST, ISO 27001, or CIS and operational resilience frameworks
* Demonstrate social and cultural flexibility by effectively collaborating with diverse teams across global regions
Qualifications
* University degree in computer science, information security, or relevant field.
* Professional certifications or equivalent practical experience.
* Demonstrable competence with network security protocols and cyber testing tools.
* Strong understanding of common security frameworks and compliance requirements.
* Excellent analytical and problem-solving skills.
* Good oral and written skills in English to be able to successfully communicate and collaborate across our Global business.
#LI-TK1
For positions requiring access to technical data, Analog Devices, Inc. may have to obtain export licensing approval from the U.S. Department of Commerce - Bureau of Industry and Security and/or the U.S. Department of State - Directorate of Defense Trade Controls. As such, applicants for this position - except US Citizens, US Permanent Residents, and protected individuals as defined by 8 U.S.C. 1324b(a)(3) - may have to go through an export licensing review process.
Analog Devices is an equal opportunity employer. We foster a culture where everyone has an opportunity to succeed regardless of their race, color, religion, age, ancestry, national origin, social or ethnic origin, sex, sexual orientation, gender, gender identity, gender expression, marital status, pregnancy, parental status, disability, medical condition, genetic information, military or veteran status, union membership, and political affiliation, or any other legally protected group.
Job Req Type: Experienced
Required Travel: Yes, 10% of the time
Shift Type: 1st Shift/Days
Auto-ApplyInformation Security Analyst
Security engineer job in Conway, SC
Posting Details Classification Title IT Security Specialist/ Analyst I Classification Code AM80 Pay Band 6 Subject to Drug/Alcohol Testing Guidelines No Subject to Credit Check No Internal Title Information Security Analyst Department Information Technology Services Position Type PCLS - Slotted Classified Full or Part Time Full-Time Basis 12 mo. Hours per week 37.5 hours per week Normal Work Schedule Mon-Thu: 8-5 ; Fri: 8-12:30 Job Details
Coastal Carolina University is currently accepting applications for the following full-time position: Information Security Analyst in the Office of Information Technology Services.
Coastal Carolina University's Information Technology Services is looking for an information security analyst who is responsible for monitoring, analyzing, and mitigating cybersecurity and compliance risks. The analyst will also aid in the development of solutions, research new technologies, assist in policy changes, and recommend content for security awareness programs.
How to Apply: Interested candidates may apply online at ***************************************** Applicants must submit a cover letter, resume and list of three (3) professional references. Review of applications will begin immediately and continue until position is filled.
Required Qualifications: A bachelor's degree in information technology systems, computer science, or related field and experience in information technology systems or related area. Relevant experience may be substituted for bachelor's degree on a year-for-year basis.
Preferred Qualifications: Experience with incident response, security monitoring, data loss prevention, implementing security controls, administering vendor supplied security software, risk assessment, security and privacy compliance, and/or participating on disaster recovery planning team.
Duties include, but are not limited to:
* Research information security events, incidents, and issues to isolate and identify root or systemic causes. Responds according to policy and best practices.
* Assists business units and operational teams with information security risk assessments and audits.
* Gathers, compiles, and synthesizes information for security processes and systems around vulnerabilities and risk.
* Aids in the development of solutions through security partnerships and research on new technologies, required policy changes, and vendor offerings.
* Recommends content for information security training and awareness programs.
IT Security Specialist/Analyst I (AM80/61122728/FTE-S01096P), full-time position with benefits. SC State Pay Band: 06. Salary range: $47,588.00 (minimum) - $67,817.00 (midpoint). Normal work hours are Monday through Thursday, 8:00 a.m. to 5:00 p.m. and Friday, 8:00 a.m. to 12:30 p.m. Must be flexible to meet the special scheduling needs of the university.
Coastal Carolina University is a public comprehensive liberal arts institution located in Conway, South Carolina, just nine miles from the Atlantic coastal resort city of Myrtle Beach. Coastal
Carolina University enrolls over 10,000 students from 49 states and 55 nations. The University is accredited by the Southern Association of Colleges and Schools Commission on Colleges to award the baccalaureate and master's degrees of national and/or regional significance in the arts and sciences, business, humanities, education, and health and human services, a specialist degree in instructional technology, and PhD degrees in marine science: coastal and marine systems science and education sciences.
The University provides equal employment opportunity without regard to race, color, religion, sex, sexual orientation, gender identity, citizenship status, national origin, or because an employee or applicant for employment is an individual with a disability or a disabled veteran, an Armed Forces service medal veteran, a recently separated veteran, or an active-duty wartime or campaign badge veteran, or other "protected veteran," as defined by law. Coastal Carolina University is an EO/AA employer.
Required Qualifications
A bachelor's degree in information technology systems, computer science, or related field and experience in information technology systems or related area. Relevant experience may be substituted for bachelor's degree on a year-for-year basis.
Preferred Qualifications
Experience with incident response, security monitoring, data loss prevention, implementing security controls, administering vendor supplied security software, risk assessment, security and privacy compliance, and/or participating on disaster recovery planning team.
Knowledge, Skills & Abilities
Possess knowledge of system and network security for various operating systems and local area networks. Experience with security tools and technologies for deploying, managing, measuring, and auditing system and network security. Has a foundational understanding of application, hosted service, and cloud security principles. Capable of contributing to the creation of detailed technical documentation on security processes and procedures. Demonstrates basic analytical and problem-solving skills. Understands risk concepts and principles. Communicates effectively with audiences of varying technical knowledge levels.
Posting Detail Information
Posting Number FTE-S01096P Number of Vacancies 1 Desired Start Date 01/12/2026 Position End Date (if temporary) Job Open Date 12/11/2025 Job Close Date Open Until Filled Yes Special Instructions to Applicants Quicklink for Posting ****************************************
Job Duties
Product Security Engineer, AI
Security engineer job in Columbia, SC
Meta's Product Security team is seeking a experienced hacker who derives purpose in life by revealing potential weaknesses and then crafting creative solutions to eliminate those weaknesses. Your skills will be the foundation of security initiatives that protect the security and privacy of over two billion people. You will be relied upon to provide engineering and product teams with the web, mobile, or native code security expertise necessary to make informed product decisions. Come help us make life hard for the bad guys.
**Required Skills:**
Product Security Engineer, AI Responsibilities:
1. Security Reviews: perform manual design and implementation reviews of products and services that make up the Meta ecosystem, like Instagram, WhatsApp, Oculus, Portal, and more
2. Developer Guidance: provide guidance and education to developers that help prevent the authoring of vulnerabilities
3. Automated Analysis and Secure Frameworks: build automation (static and dynamic analysis) and frameworks with software engineers that enable Meta to scale consistently across all of our products
**Minimum Qualifications:**
Minimum Qualifications:
4. BS or MS in Computer Science or a related field, or equivalent experience
5. 8+ years of experience finding vulnerabilities in interpreted languages. Knowledge of best practice secure code development
6. Experience with exploiting common security vulnerabilities
7. Knowledge of common exploit mitigations and how they work
8. Coding and scripting experience in one or more general purpose languages
**Preferred Qualifications:**
Preferred Qualifications:
9. Experience creating software that enables security processes, especially those leveraging AI/ML for automation or augmentation
10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling
11. Experience creating software that enables security processes
12. 8+ years of experience finding vulnerabilities in C/C++ code
13. Contributions to the security community (public research, blogging, presentations, bug bounty)
14. Demonstrated ability to collaborate with AI researchers or engineers to apply AI in security workflows
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Security Engineer
Security engineer job in Charleston, SC
Who we are We help enterprises unlock the future of AI, and realize untapped potential through a thoughtful approach to access, security, and scalability. We're a growing startup at the forefront of enterprise GenAI infrastructure. We are building a next-generation platform that empowers enterprises to securely adopt and manage advanced AI workflows. We know that successful technology adoption hinges on secure and appropriate access. Our founding team helped shape past technology revolutions - from pioneering secure API Management during the rise of mobile apps to driving enterprise AI adoption across Fortune 100 enterprises.
At the core of all we do is our team. We're made up of builders, creators, and curious minds, on a mission to make AI safer, more responsible. Just as we are thoughtful about our products, we're thoughtful about how we build teams and our culture. We believe with each addition to the team, culture can be enhanced. Take a look at what we value in our About Barndoor page. If this speaks to you, we'd love to hear from you!
How you'll make an impact Security is foundational to everything we build. As our core Security Engineer, you will directly continue to shape the architecture, policies, and culture that scale our secure software. The systems you design will enable our customers-enterprises with complex regulatory and operational needs-to safely deploy AI-powered agents at scale. Your work won't just prevent breaches-it will enable trust, unlock innovation, and differentiate our platform in the market.
What You'll Be Working OnWhile all roles have fluidity, here's a sense of some of what you might work on at any given time.
Core responsibilities and role responsibilities include:
Responsibilities
Audit and strengthen OAuth 2.0 and OIDC token flows across internal proxies, the control plane, and third-party integrations
Identify and mitigate common and emerging threats in delegated authentication workflows
Review and co-design REST, WebSocket, and streaming APIs with strong boundaries, secure defaults, and least-privilege access models
Help define system boundaries for multi-agent, multi-tenant orchestration
Integrate and tune automated CVE, SCA, and IaC scanning tools into CI/CD pipelines
Convert security findings into high-signal engineering tickets with practical remediation paths
Lead lightweight, iterative threat models for new features and services
Define internal security baselines and policies, and mentor others to promote a strong security culture
Favor automation-friendly controls over burdensome manual security processes
Contribute to compliance initiatives such as SOC 2 and ISO 27001, supporting scalable security programs
Leverage deep expertise in OAuth 2.0/OIDC with real-world experience securing authentication flows in production systems
Design secure APIs, review system architectures, and implement scalable authentication and authorization models
Apply hands-on experience with supply chain and container security tools such as Trivy, Snyk, Grype, and Terraform scanning
Demonstrate familiarity with modern identity platforms like Auth0, Okta, and Keycloak, and with Zero Trust models
Requirements
5+ years in application or platform security roles, ideally in high-growth SaaS or cloud-native environments.
Deep expertise in OAuth 2.0/OIDC, including real-world experience securing auth flows in production systems.
Strong track record designing secure APIs, reviewing system architectures, and implementing scalable authN/authZ models.
Hands-on experience with supply chain and container security tools (e.g., Trivy, Snyk, Grype, Terraform scanning).
Familiarity with modern identity platforms (Auth0, Okta, Keycloak) or Zero Trust models.
Proven success contributing to SOC 2, ISO 27001, and overall compliance programs.
Experience working with AI/ML platforms or agent-based architectures.
Comfortable collaborating with infrastructure, product, and legal teams to align security priorities with company goals.
Passion for mentorship, documentation, and building a strong security culture without over-engineering.
Soft Skills That Matter Here
Startup Agility: You thrive in fast-paced, evolving environments and are quick to take initiative without waiting for perfect clarity.
Ownership Mentality: You see a gap and step in-you don't wait to be told what needs securing, you go find it.
Collaborative Spirit: You work well across functions-engineering, product, sales, and beyond-to elevate the entire team's security awareness.
Pragmatic Mindset: You balance ideal security outcomes with real-world constraints, always looking for simple, sustainable solutions.
Mentorship and Influence: You uplift teammates by sharing knowledge and helping others build security into their everyday thinking.
Travel RequirementsTeam connection is an important part of our culture. With a remote-friendly structure, we do require that our team be available to travel for in-person collaboration sessions and meetings. Some roles may have more travel than others. Typical team meetups are every 6-8 weeks, however, this may vary depending on team and business needs. We work to plan out our travel schedules in advance to give as much notice as possible.
Equal Opportunity EmployerWe celebrate diversity and are committed to creating an inclusive environment for all employees. We do not discriminate based on race, color, ancestry, national origin, citizenship, religion or creed, sex (including pregnancy, childbirth, and related conditions), sexual orientation, gender identity or expression, age, marital status, veteran status, disability, genetic information, or any other legally protected status. We believe that diverse teams build better products, and we strive to ensure that our hiring, development, and advancement practices are fair, equitable, and welcoming for everyone.
Auto-ApplyEngineer, Information Security and Risk
Security engineer job in Columbia, SC
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Security Engineer
Security engineer job in Fort Mill, SC
Remain current on security trends, standards, regulations, and tools.
Ensure cybersecurity files are maintained and current.
Hold security review meetings regularly with relevant stakeholders.
Monitor development tool and 3 rd party software items for vulnerabilities and updates.
Run regular scans on products using latest tools to detect newest vulnerabilities.
Work with development to keep 3 rd party software incorporated in products updated.
Review encryption algorithms to make sure current best practices are followed.
Ensure code authenticity is managed and secure.
Review security training for personnel is completed.
Ensure device Windows Images use latest updates and are released regularly.
Senior Security TAC Engineer
Security engineer job in South Carolina
Are you passionate about technology and enjoy explaining complex solutions in a way that everybody gets excited? If so, read on! About PicusPicus Security, the leading security validation company, gives organizations a clear picture of their cyber risk based on business context. Picus transforms security practices by correlating, prioritizing, and validating exposures across siloed findings so teams can focus on critical gaps and high-impact fixes. With Picus, security teams can quickly take action with one-click mitigations to stop more threats with less effort.
The Picus Security Validation Platform easily reaches across on-prem environments, hybrid clouds and endpoints coupled with Numi AI to provide exposure validation.
The pioneer of Breach and Attack Simulation, Picus delivers award-winning threat-centric technology that allows teams to pinpoint fixes worth pursuing, offering a 98% recommendation in Gartner Peer Review.
About The RoleAs a Senior Security Engineer in the Picus Global Technical Assistance Center (TAC), you will work directly with our global customers to enhance their cyber resilience through both advanced threat detection and effective prevention strategies.
You will investigate why specific attacks are not being detected and improve detection coverage by integrating Picus with SIEM, EDR, and XDR technologies. Beyond detection, you will also help strengthen customers' security postures by contributing to prevention-focused improvements involving firewalls (NGFW), web application firewalls (WAF), and other security controls.
This is a customer-facing, hands-on technical role. You will be a trusted advisor, providing direct support during integration and setup, assisting with configuration and optimisation, and guiding customers through deploying Picus solutions in their environments.
You will also collaborate cross-functionally with our R&D, Labs, and Product teams to share field insights and continuously improve our platform.What You'll Do
Act as a trusted technical advisor for customers, assisting with both detection and prevention use cases using Picus technology
Support the integration of Picus into SIEM, EDR, XDR, firewall, WAF environments, and other security controls
Troubleshoot and resolve complex customer issues in a timely and effective manner
Assist with the deployment and configuration of Picus software in customer environments
Collaborate with R&D, Product Management, and QA to escalate product issues and ensure continuous improvement
Identify detection gaps and recommend tailored solutions to improve threat visibility
Review prevention layers and advise on configuration optimisations (e.g., NGFW rules, WAF policies)
Identify patterns across customer environments and contribute to scalable solutions
Create and maintain technical documentation based on field experience
Support US-based customers as a primary contact, ensuring excellent service quality
Publish test results, findings, and recommendations for broader knowledge sharing
What You Have
Bachelor's degree in Computer Science or a related field, or equivalent hands-on experience
Solid background in cybersecurity, with strong knowledge of threat detection and prevention techniques
Experience integrating and troubleshooting SIEM, EDR, and XDR platforms
Familiarity with NGFW (Next-Generation Firewalls), Web Application Firewalls (WAF), DLP (Data Loss Prevention), antivirus, endpoint security, and email security solutions
Ability to analyse, diagnose, and resolve complex issues
Proficiency in English (written and spoken)
Excellent communication and interpersonal skills; comfortable engaging with customers remotely and onsite
Basic understanding of Windows or Linux systems, including administration and security risks
Experience working in a customer-facing technical support or advisory role
Good understanding of the TCP/IP protocol suite and ability to analyse packet captures (Desirable)
Experience with scripting (e.g., bash) for automation or troubleshooting (Desirable)
Knowledge of current security control technologies, including but not limited to firewalls, DLP, AV, endpoint protection, WAFs, and email security solutions (Desirable)
Experience with log analysis, query optimisation, and custom use case development for detection or prevention (Desirable)
Working at PicusFascinating work - a chance to shape and lead an exciting, fast-growing cyber security segment. Security Validation is a concept that helps organizations evaluate their security posture in a continuous, automated, and repeatable way. This approach allows for the identification of imminent threats, provides recommended actions, and produces valuable metrics about cyber-risk levels.
Unlimited opportunity! We are growing. At Picus, you'll be provided with as much responsibility as you can handle - new career development opportunities constantly arise given our rate of growth.
Global exposure - Get a lot of experience working not only in a fast-growing startup but also interact with customers all around the world.
Be part of a global remote team who is taking on Exposure Validation and a growing market segment.
We are an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to age, sex, race, color, national origin, religious belief, gender or gender reassignment, sexual orientation, marriage or civil partnership, pregnancy and maternity, disability, protected veteran status, or any other characteristic protected by International law. Upon conditional offer of employment, candidates are required to complete reference and identity checks in line with local labor laws and as per the Company's employment policy.
Auto-ApplyCyber Engineer III
Security engineer job in Charleston, SC
Location: Charleston, SC Cyber Engineer III Overview: ITC Defense is seeking to hire a Cyber Engineer III in support of U.S. Navy /Air Force CYP (Child Youth Programs) CCTV Lifecycle Support Service program. Responsibilities:
Design, implement, and maintain security controls and architectures across networks, systems, and applications in alignment with NIST, ISO 27001, CIS, and Zero Trust principles.
Evaluate, integrate, and manage security tools and technologies, including SIEM, SOAR, EDR, IDS/IPS, DLP, and IAM solutions.
Lead or support advanced threat detection, incident response, forensic analysis, and remediation activities.
Conduct threat modeling, security design reviews, and root cause analysis for new and existing systems.
Perform system security assessments, risk analyses, and vulnerability management, including remediation tracking.
Coordinate and validate penetration testing efforts and report on security metrics and risk posture.
Support compliance, audit, and ATO activities (e.g., NIST 800-53, NIST 800-171, CMMC, FedRAMP).
Develop, maintain, and improve security documentation, policies, procedures, and incident response playbooks.
Other duties as assigned.
Minimum Qualifications:
Master's degree in Cybersecurity, Computer Engineering, Electrical Engineering, Electronics Engineering, or Mathematics with a concentration in Computer Science (or equivalent).
Minimum of ten (10) years of demonstrated experience preparing, implementing, and ensuring compliance with cybersecurity policies and standards.
DoD 8570.1M-compliant certification at one or more of the following levels, as required by PWS tasking:
Information Assurance Management (IAM) Level I
Information Assurance Technical (IAT) Level I
Information Assurance System Architect and Engineer (IASAE) Level I
Experience supporting Assessment and Authorization (A&A) activities, including planning, implementation, and ongoing compliance.
Experience designing, upgrading, monitoring, and maintaining cybersecurity measures to improve cyber defense and ensure network resiliency.
Proven experience assessing cybersecurity vulnerabilities, performing risk analysis, and developing and implementing remediation or risk mitigation strategies.
Experience ensuring security controls are in place to protect digital files and electronic infrastructure.
Experience responding to and reporting on cybersecurity incidents and security breaches.
Preferred Qualifications:
Experience with NIST, CMMC, Zero Trust, and cloud security frameworks (AWS, Azure, GCP).
Hands-on expertise with security tools (SIEM, SOAR, EDR, IDS/IPS, DLP, IAM) and vulnerability management.
Strong analytical, problem-solving, and critical-thinking skills to assess risks and develop solutions.
Excellent communication, collaboration, and mentoring abilities for cross-functional teams.
Why work at ITC Defense:
Employer Supplemented Health Insurance
Employer Paid Dental and Vision Insurance
Employer Paid Life and AD&D Insurance
3% Biweekly 401(k) Contribution
Paid Time Off
Tuition and Certification Reimbursement
Competitive Salaries with Performance Incentives
A positive working environment with supportive teammates and leadership
ITC Defense Corp. is committed to creating a diverse environment and is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or protected veteran status. U.S. Citizenship is required for most positions. This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Duties, responsibilities and activities may change, or new ones may be assigned at any time with or without notice. Employment with ITC is at-will. For further information on our equal opportunity protections as part of the employment process, please see **************************************************************** and ***********************************************************************************************
ACCESSIBILITY- Candidates must be able to perform the essential functions of the position satisfactorily and that, if requested, reasonable accommodation may be made to enable employees with disabilities to perform the essential functions of their job, absent undue hardship. If you are a qualified individual with a disability or a disabled veteran, you have the right to request a reasonable accommodation for purposes of participating in the application/selection process with ITC. Please refer to our website ************************** for further information on all our EEO/VEVRAA policies.
Thank you for your interest in ITC Defense!
Powered by JazzHR
jPDNgXKqeE
Security Engineer II
Security engineer job in Columbia, SC
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs.
**Responsibilities:**
+ Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
Information Security Engineer
Security engineer job in Greer, SC
Proterra offers a dynamic and supportive workplace where our employees can thrive personally and professionally. With cutting-edge facilities and groundbreaking projects, Proterra offers unique opportunities to grow, collaborate, and lead transformative change in the electrification of heavy-duty transportation and equipment.
Our commitment to innovation extends beyond our battery solutions to our people, where we create an environment where everyone feels valued, supported, and empowered to drive change for the earth. Here at Proterra we strive to foster a culture of inclusivity, valuing diverse perspectives and encouraging bold ideas, allowing our employees to bring their full selves to work. Our employees benefit from competitive total rewards packages, and opportunities to develop professionally.
Position Overview:â¯
The Information Security Engineer will be responsible for developing, enhancing, and executing Information Security Operations at Proterra.⯠In this position you will assist with the maintenance and implementation of IT security systems to protect Proterra's corporate, manufacturing, cloud and IoT environments from cyber-attacks. You will maintain and lead incident response and escalations with our security operations center, be responsible for vulnerability management and participate in the creation or improvement of company security policies/ procedures.⯠You will be responsible for conducting/leading risk assessments and participating in and supporting security assessments and audits. Additionally, you will be assisting with evaluation, setup and utilization of new security products and technologies.â¯
About the Role - You will:â¯
Identify and analyze potential threat activity targeting client networks via monitoring systems, alerts, vulnerabilities, SIEM tools and network traffic and respond for immediate remediation.
Work with cross functional teams to support security requirements to protect organization's corporate, manufacturing, cloud and IoT environments from cyber-attacks.
Oversee and maintain existing security tools as well as overall enterprise security systems that include network and/or host-based intrusion detection systems, anti-virus/advanced EDR, SIEM/event correlation, file integrity monitoring, full packet captures, computer forensics, encryption, vulnerability management, data loss prevention and application scanning.â¯
Responsible for the coordination and actions needed for remediation generated by incident reports and manufacture recommended patching and hotfixes.
Identify and analyze potential threat activity targeting client networks via monitoring systems, alerts, vulnerabilities, SIEM tools and network traffic and respond for immediate remediation.
Work with cross functional teams to support security requirements to protect organization's corporate, manufacturing, cloud and IoT environments from cyber-attacksâ¯â¯
Oversee and maintain existing security tools as well as overall enterprise security systems that include network and/or host-based intrusion detection systems, anti-virus/advanced EDR, SIEM/event correlation, file integrity monitoring, full packet captures, computer forensics, encryption, vulnerability management, data loss prevention and application scanning.â¯
Responsible for the coordination and actions needed for remediation generated by incident reports and manufacture recommended patching and hotfixes.
Assist Crowdstrike Falcon Complete team in remediation of critical information security incidents in coordination with 3rd party SOC team.â¯
Implement and maintain security controls and have a suitable knowledge of existing cyber threats to infrastructure and clouded environments.â¯
Participate in scheduled security assessment activities and projects to ensure industry compliance.â¯
Initiate and maintain Security Incident Response Plan (SIRT) and After-Action Reports (AARs) to maintain operational continuityâ¯
Identify, analyze and interpret threat actors and malicious activity in client environments act upon and take the appropriate actions towards remediation and documentation.â¯
Differentiate between potential intrusion attempts and pinpoint false alarmsâ¯by working with EDR, Identity Protection and NextGen SIEM to develop resolution plans.
Perform 3rd party vendor assessments and fulfill Proterra security assessments requirements
Triage and respond to security events - serve as a primary responder for incidents, taking ownership of incidents and tracking through resolution.â¯
Performs other related duties as assigned.â¯
Your Experience Includes:
3-5 years of related information technology infrastructure experience⯠with identity and access management [IAM], SSO solutions including (SAML 2, OAuth 2, OIDC).
Some experience in securing enterprise networks, including firewalls, VPNs, intrusion detection/prevention systems (IDS/IPS), and secure network protocols (e.g., IPsec, SSL/TLS) heavy emphasis in SaaS apps such as Crowdstrike Falcon Complete, Netskope DLP, Nessus Tenable and asset management platforms such as Axionus.
Overall Knowledge of endpoint protection technologies (e.g., anti-malware, EDR, DLP), and experience in managing and securing workstations, mobile devices, and servers.
Have participated in penetration testing, vulnerability assessments, and red teaming exercises.
General understating of industry standards, compliance, and legal requirements (ISO 27001, FedRAMP, NIST 800-171, NIST 800-53, SOC2, etc.)â¯
Excellent trouble-shooting abilities in software and hardware and be able to lead outage calls and trouble-shooting conversations until resolved and provide detailed root cause analysis reports.â¯
Above average understanding in vulnerability reporting using Saas platforms such as Nessus Tenable.
Education:
Bachelor's degree in computer science, Information Security, Electrical Engineering or Management Information Systems preferred. Equivalent years of consecutive IT security experience with recognized industry certifications may be considered.
Certifications:
CISSP, CASP+, SSCP+, or other relevant security certificatesâ¯
Certified Ethical Hacking (CEH) CISSP, CISA
Network+, Security+, Linux+ or combination of similar certificates acceptable.
Applicants must be authorized to work for any employer in the U.S. There is no immigration sponsorship available for this role (ex: H1-B, OPT, CPT, TN or any other employment sponsorship).â¯
#LI-BJ1
Cyber Engineer
Security engineer job in North Charleston, SC
Overview/ Job Responsibilities
Sev1Tech is seeking a Cyber Engineer to support the Naval Information Warfare Center Atlantic (NIWC Atlantic) Expeditionary Enterprise Systems and Services (E2S2) Division. NIWC Atlantic provides design, acquisition, and sustainment services for Marine Corps Systems Command (MCSC) Information Technology (IT) systems).
In this role, the Cyber Engineer will be responsible for planning, implementing, upgrading, and monitoring cybersecurity measures to enhance cyber defense and maintain a resilient, secure network. The ideal candidate will assess vulnerabilities, propose and execute remediation and risk mitigation strategies, and ensure appropriate security controls are in place to safeguard digital assets and critical infrastructure.
This position requires a balance of technical expertise, hands-on problem solving, and experience in cybersecurity policy, compliance, and system protection in alignment with DoD standards and mission objectives.
Responsibilities:
Plan, implement, upgrade, and monitor cybersecurity measures to strengthen and maintain network defense.
Assess cybersecurity vulnerabilities for risk and propose and implement remediation actions or risk mitigation strategies.
Ensure security controls and countermeasures are properly implemented to protect digital files and networked systems.
Respond to cybersecurity incidents and breaches, re-establish protections, and produce required documentation and reports.
Prepare, implement, and ensure compliance with cybersecurity policies, including Assessment and Authorization (A&A) requirements.
Deploy and operate enterprise tools that support advanced threat hunting, detection, and monitoring capabilities.
Implement network inspection and packet capture systems to identify and mitigate potential threats.
Perform equipment installation and configuration, maintaining high standards of cable management and system organization.
Collaborate with engineering, cyber, and program teams to maintain compliance with DoD, NIWC Atlantic, and MCSC cybersecurity standards.
Minimum Qualifications
Active Top Secret Level Clearance
Three (3) years of notable experience preparing, implementing, and ensuring compliance with cybersecurity policy, including Assessment and Authorization (A&A) requirements.
Planning, implementing, upgrading, and monitoring cybersecurity measures to improve cyber defense and maintain resilient networks.
Assessing cybersecurity vulnerabilities for risk and developing remediation or mitigation strategies.
Ensuring appropriate security controls are in place to safeguard digital files and electronic infrastructure.
Responding to security incidents and breaches, re-establishing protections, and preparing required reports and documentation.
Minimum requirement noting a combination of these skills and experiences is preferred:
SIEM Platforms: Azure Sentinel, Splunk, or ElasticSearch for event correlation and incident analysis.
Network Visibility Tools: Gigamon, NetFlow, or equivalent for enhanced traffic monitoring and flow analysis.
Firewall Technologies: Experience configuring and maintaining Palo Alto Networks NGFW or similar solutions.
Big Data Platforms: Familiarity with BDP-CHAOS (USMC Big Data Platform for Cyber Information) or related analytics environments.
SSL Break-and-Inspect solutions for outbound traffic inspection and decryption.
Working knowledge of DoD cybersecurity frameworks and defense IT compliance standards.
Education & Certifications:
Bachelor's degree in Cybersecurity, Computer, Electrical, or Electronics Engineering, or Mathematics with a concentration in Computer Science, or equivalent.
The individual shall be certified as Information Assurance Management (IAM), Information Assurance Technical (IAT), or Information Assurance System Architect and Engineer (IASAE) Level I (position-based) per DoD 8570.1M.
Must be willing to travel up to 60 days per year, including multiple week-long trips to CONUS and OCONUS locations in support of mission requirements.
About Sev1Tech LLC
Welcome to Sev1Tech! Founded in 2010, we are proud to be a leading provider of IT modernization, engineering, and program management solutions. Our commitment is to deliver exceptional program and IT support services that empower critical missions for both Federal and Commercial clients.
At Sev1Tech, our mission is clear: Build better companies. Enable better government. Protect our nation. Build better humans across the country. We believe that through innovation and dedication, we can make a significant impact on the communities we serve.
Join the Sev1Tech family, where your potential for greatness is limitless! Here, you will not only achieve remarkable accomplishments but also enjoy a fulfilling and rewarding career progression. We invite you to explore opportunities with us and become part of a team that values your contributions and growth.
Ready to take the next step? Apply directly through our website: Sev1Tech Careers and use the hashtag #join Sev1Tech to connect with us on social media!
For any additional questions or to submit referrals, feel free to reach out to ***********************.
Auto-ApplyCyber Security Analyst
Security engineer job in North Charleston, SC
PRIMARY DUTIES & RESPONSIBILITIES:
Conducts regular risk assessments to identify potential vulnerabilities and threats within the AWS IL5 environment
Develops strategies for risk mitigation and implements necessary controls to address identified risks
Maintains a risk register documenting identified risks and corresponding mitigation actions
Ensures AWS configurations align with IL5 security requirements, including encryption, access controls, and network segmentation
Implements and enforces compliance with relevant security standards and regulations, such as NIST SP 800-53 and DoD IL5 requirements
Monitors AWS configurations for deviations from security baselines and promptly remediates any non-compliant settings
Implements strong IAM policies to enforce least privilege access across AWS resources
Regularly reviews IAM roles and permissions to ensure alignment with the principle of least privilege
Enables multi-factor authentication (MFA) for privileged accounts and sensitive operations
Deploys robust monitoring tools to detect unauthorized access attempts, suspicious activities, and security breaches
Establishes incident response procedures to promptly respond to security incidents and minimize their impact
Conducts post-incident reviews to identify lessons learned and improves incident response processes
Implements encryption mechanisms to protect data at rest and in transit within the AWS IL5 environment
Regularly reviews encryption policies and key management practices to ensure effectiveness
Provides regular security training and awareness programs to AWS IL5 users and administrators
Educates users about common cyber threats, phishing attacks, and best practices for secure usage of AWS resources
Encourages a culture of security awareness and proactive risk mitigation among all stakeholders
Conducts periodic security assessments and audits to evaluate the effectiveness of cyber security controls
Identifies areas for improvement and implement enhancements to strengthen the security posture of the AWS IL5 Cloud SCCA
Stays abreast of emerging cyber threats, vulnerabilities, and industry best practices to adapt security measures accordingly
Travels approximately 3-4 days a quarter, as required
DESIRED SKILLS & REQUIREMENTS:
RMF experience
USMC Cyber experience
SAFe (Scaled Agile Framework) experience
Working Place: North Charleston, South Carolina, United States Company : Scientific Research Corporation
IS Security Analyst
Security engineer job in Columbia, SC
Researches, analyzes and troubleshoots information systems compliance and security issues. Identifies, validates and reports on security incidents and events based on enterprise policies and procedures. Performs forensic information security investigations involving enterprise computers, servers and/or networking infrastructure. Assists in providing security infrastructure and support for enterprise systems.
Description
Logistics: BlueCross BlueShield of South Carolina
Location: This hybrid position is full-time (40-hours/week) Monday-Friday in a typical office environment. You will work an 8-hour shift scheduled during our normal business hours of 8:00AM-5:00PM with rotational on-call duties. It may be necessary, given the business need to work occasional overtime. This role is located at 2501 Faraway Drive, Columbia, SC 29223.
Government Clearance: This position requires the ability to obtain a security clearance, which requires applicants to be a U.S. Citizen.
Sponsorship: This position is not eligible for sponsorship now or in the future.
Position Purpose:
Researches, analyzes and troubleshoots information systems compliance and security issues. Identifies, validates and reports on security incidents and events based on enterprise policies and procedures. Performs forensic information security investigations involving enterprise computers, servers and/or networking infrastructure. Assists in providing security infrastructure and support for enterprise systems.
What You'll Do:
Responsible for analyzing compliance and technical control validation data to determine and report baseline variance for all applicable technology environments.
Interfaces with internal and external audit staff to ensure appropriate and accurate responses to audit queries are satisfied in a timely fashion.
Assists in researching and evaluating systems and procedures for the prevention, detection, containment and correction of information security breaches. Assists in advising management and users regarding security procedures and compliance policies.
Utilizing technologically advanced software, performs system monitoring evaluations and audits to ensure compliance with the corporate security policies and standards.
Prepares and analyzes compliance information to develop mitigation priorities, milestones and audit responses.
Participates in the evaluation of products and/or procedures to enhance productivity and effectiveness of information security across the organization.
Assists architects and security specialists to ensure adequate security solutions are in place throughout IT systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements.
Work Environment: Fast paced, multi-platformed environment which may require action and response 24X7 to support the technical business needs of the customer.
To Qualify, You'll Need:
Required Education:
Bachelor's degree in a job-related field
Degree Equivalency:
8 total years of job-related work experience
OR
Associate's degree in a job-related field plus 2 additional years of job-related work experience for a total of 6 years of job-related work experience.
Required Experience:
4 years of job-related technical experience.
Required Skills and Abilities:
Strong data analysis and correlation abilities.
Strong organizational, interpersonal and communication skills.
Strong knowledge of administrative, procedural and technical controls used to reduce security risks.
Ability to effectively prioritize and execute tasks in a high-pressure environment.
Strong knowledge of enterprise data architecture, systems engineering and data communications as applied to the automated storage and retrieval of information, using multiple platforms and protocols with the inherent security risks of each.
Strong understanding of the organization's goals and objectives.
Strong familiarity with threat analysis risk management, configuration management, business continuity and contingency planning as it applies to IT.
Ability to troubleshoot multi-vendor Security issues.
Able to work in a team-oriented, collaborative environment.
Excellent attention to detail.
Required Software and Tools:
Strong proficiency with applicable IT Security tools (software and hardware).
Microsoft Office.
We Prefer that You Have:
Preferred Work Experience:
Experience in network security (Cisco ASA, IPS, VPN, RSA SecurID, PKI, cryptography), security controls for LAN/WANs, client server, web-based systems, and databases.
Experience with configuration of security devices such as firewalls, intrusion prevention, patch deployment, and risk assessment/ vulnerability scanners.
Level 1 SOC Experience
Preferred Software Tools:
Intrusion Detection/Prevention systems
SIEM Monitoring tools
Endpoint Detection and Response software
Forensics Analysis tools
Tennable Nessus scanning software
Preferred Licenses and Certificates: CompTIA Security +, OSCP, GIAC (GSEC, GCIH), CISA, NSA, CISM, CISSP
What we Can Do for You:
Our comprehensive benefits package includes:
401(k) retirement savings plan with company match
Subsidized health plans and free vision coverage
Life insurance
Paid annual leave - the longer you work here, the more you earn.
Nine paid holidays
On-site cafeterias and fitness centers in major locations
Wellness programs and a healthy lifestyle premium discount
Tuition assistance
Service recognition
What to Expect Next:
After submitting your application, our recruiting team members will review your resume to ensure you meet the qualifications. This may include a brief telephone interview or email communication with our recruiter to verify resume specifics and salary requirements. Management will be conducting interviews with those candidates who qualify with prioritization given to those candidates who demonstrate the preferred qualifications.
Equal Employment Opportunity Statement
BlueCross BlueShield of South Carolina and our subsidiary companies maintain a continuing policy of nondiscrimination in employment to promote employment opportunities for persons regardless of age, race, color, national origin, sex, religion, veteran status, disability, weight, sexual orientation, gender identity, genetic information or any other legally protected status. Additionally, as a federal contractor, the company maintains affirmative action programs to promote employment opportunities for individuals with disabilities and protected veterans. It is our policy to provide equal opportunities in all phases of the employment process and to comply with applicable federal, state and local laws and regulations.
We are committed to working with and providing reasonable accommodations to individuals with disabilities, pregnant individuals, individuals with pregnancy-related conditions, and individuals needing accommodations for sincerely held religious beliefs, provided that those accommodations do not impose an undue hardship on the Company.
If you need special assistance or an accommodation while seeking employment, please email ************************ or call ************, ext. 47480 with the nature of your request. We will make a determination regarding your request for reasonable accommodation on a case-by-case basis.
We participate in E-Verify and comply with the Pay Transparency Nondiscrimination Provision. We are an Equal Opportunity Employer. Here's more information.
Some states have required notifications. Here's more information.
Auto-ApplyCyber Security Analyst - GRC Support
Security engineer job in Aiken, SC
Savannah River National Laboratory (SRNL) is seeking an energetic individual with good interpersonal skills to join the Cyber Assurance, Governance, Risk Management and Compliance team! The selected individual will assist the Information Systems Security Officer (ISSO) and GRC team with NIST Risk Management Framework (RMF) processes to ensure a secure operational security posture is in place and maintained throughout the lifecycle of the system and/or network.
Minimum Qualifications:
Bachelor's degree in Computer Science, Information Assurance, or related field
4-6 years of relevant experience in NIST Risk Management Framework and Control Sets (i.e., NIST 800-37 and NIST 800-53) as a federal-contractor employee
For ability to obtain and maintain a security clearance, US Citizenship is Legally Required
Preferred Qualifications:
Working knowledge and experience with the NIST Risk Management Framework and Control Sets (i.e., NIST 800-37 and NIST 800-53) in a federal contractor role
Attention to detail and strong written communication skills (clear, concise for evidence/control implementation descriptions)
Experience with information assurance tools (GRC, Tenable.SC, Nessus, Splunk, etc.)
Ability to quickly learn new technologies, concepts, and processes
Demonstrated ability to work collaboratively in a team environment with good interpersonal skills
Active DOE L clearance
Data entry, updates and maintenance of System Security Plans and other documents/evidence in the GRC tool
Executing scans security scans (compliance and vulnerability related)
Tracking status of temporary risk findings to closure and gathering remediation evidence
Pulling configuration compliance reports, STIG checklists, CIS benchmarks
Assist with RMF Continuous Monitoring activities and new project Risk Assessments
Assist Project Security Officers and ISSOs with preparation of authorization packages for new projects and accreditation boundary
Assist with entry of new risks, updates or maintenance in the risk register
Assist in performing security impact analysis using approved security policies and SSPs and provide recommendations for meeting requirements with adequate security controls that align with business objectives.
Work effectively in a team environment to resolve issues and contribute to continuous process improvement efforts.
Participate/assist with compliance assessments/audits and data calls.
Interact with customers and peers in a professional and responsive manner.
Auto-ApplySenior Cyber Security Analyst - (ISSM)
Security engineer job in Aiken, SC
DNI is on the lookout for a Senior Cyber Security Analyst - Information Systems Security Manager (ISSM) to deliver expert guidance in Information Systems Security and cybersecurity support for the Enterprise Information Services at the Department of Energy (DOE) Savannah River Operations Office (DOE-SR), located at the Savannah River Site (SRS) in Aiken, SC.
Requirements
Reports to the Chief Information Security Officer (CISO) and Program Manager.
Oversee the Authority to Operate (ATO) lifecycle, manage risk assessments, develop and monitor Plan of Action and Milestones (POAMs), ensuring compliance with security standards and timely mitigation of organizational boundary security risks.
Actively participate in the bi-weekly accreditation boundary meetings and keep the AODR informed of any changes/updates to eRAMS/POA&Ms/STAR items or any new VPM and CM issues that may arise.
Provide technical and procedural cyber security advice to DOE, associate contractor partners, and Industrial Control Systems (ICS) teams as necessary.
Oversee operational information systems security implementation programs.
Coordinate with Information System Security Officer (ISSO) or PSO on approval of External Information Systems (e.g. guest systems, interconnected system with another organization).
Oversee ISSOs to ensure they follow established policies and procedures and timelines.
Ensure CM policies and procedures for authorizing the use of hardware/software on an IT system are followed. Any additions, changes or modifications to hardware, software, or firmware must be coordinated with the AODR prior to the addition, change or modification. ISSM shall have authority to veto any proposed change they feel is detrimental to security in boundaries under their purview. Appeals on an ISSM/ISSO veto may be taken to the AODR.
Ensure approved procedures are used for sanitizing and releasing system components and media as necessary.
Ensure proper measures are taken when cyber security incident or vulnerability is discovered.
Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures.
Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs).Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance.
Manage, maintain, and execute the information security continuous monitoring plan.
Ensure a record is maintained of all security-related vulnerabilities and ensure serious or unresolved violations are reported to the AODR; and assess changes to the system, its environment, and operational needs that could affect the security authorization.
Other related tasks as assigned.
Support information technology (IT) security goals and objectives and reduce overall organizational risk; Advise senior management (e.g., Chief Information Security Officer [CISO] and Chief Information Officer [CIO] on risk levels and security posture.); Advise appropriate senior leadership of changes affecting the organization's cybersecurity posture; Communicate the value of information technology (IT) security.
Knowledge, Skills, and Abilities:
Highly organized individual with exceptional communication skills, ensuring all stakeholders are consistently informed and updated as required.
Excellent written and oral communication skills (writing samples may be requested).
Attention-to-detail is critical, proven ability to look closely at your work to identify and correct errors, spot and improve weaknesses and produce a near-perfect end-result.
Ability to identify problems, brainstorm and analyze answers, and implement the best solutions.
Ability to develop and review security related procedures or processes and reports.
Demonstrated ability to provide clear, precise, and factual information to senior leaders, team members, and external stakeholders.
Capable of attending all customer-required meetings and promptly providing responses as requested.
Familiarity with applicable regulations affecting Cyber Security NIST 800 Series Standards.
Clearance:
Must possess (or be able to obtain) a “Q” level security clearance.
Education:
A bachelor's degree in information technology systems, computer science, or related field and experience in information technology systems or related area. Relevant experience may be substituted for education on a year-for-year basis.
Experience:
7+ years in IT security or related field.
Authority to Operate Life Cycle (ATO), Risk Management, POAMS & Milestones
Certification:
Highly desired certifications:
Certified Information System Security Professional (CISSP)
Certified Information Security Manager (CISM)
Benefits
Covers 100% of employee benefit premiums, including Medical (PPO or HDHP Option), Vision, Dental
Matching 401K
Short- and Long-Term Disability
Pet Insurance
Professional Development/Education Reimbursement
Parking and Transit Benefits for NY, NJ, ATL, and DC Metro areas
Other Duties:
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
Product Security Engineer, Instagram
Security engineer job in Columbia, SC
The Instagram Security Ecosystems team is seeking a product-focused security engineer interesting in enabling Instagram product teams to develop features with a focus on security and user safety. You will be relied upon to directly work with Instagram engineers, hardening both product features and our protective frameworks that make life harder for bad actors on the Instagram platform.
**Required Skills:**
Product Security Engineer, Instagram Responsibilities:
1. Threat Modeling and Security Architecture: Work directly with product managers and technical leads on threat models and security architecture for novel Instagram features or products
2. Security Reviews: Perform manual design and implementation reviews of web, mobile, and native code
3. Developer Guidance: Provide guidance and education to developers that help prevent the authoring of vulnerabilities
4. Automated Analysis and Secure Frameworks: Work with other security teams to improve Instagram's static and dynamic analysis and frameworks to scale coverage
5. Bug Bounty: Help provide technical guidance to our world class bug bounty program and independent security researchers
6. Industry Impact: Push the industry forward through conference talks and open source projects to contribute broadly to security for the world
**Minimum Qualifications:**
Minimum Qualifications:
7. B.S. or M.S. in Computer Science, Cybersecurity, or related field, or equivalent experience
8. 8+ years of experience finding vulnerabilities in interpreted languages (Python, PHP)
9. Extensive, proven experience in threat modeling and secure systems design
10. Experience with exploiting common security vulnerabilities
**Preferred Qualifications:**
Preferred Qualifications:
11. Product software engineering or product management experience
12. Experience in security consulting or other leadership-facing security advisory roles
13. Familiarity with cybersecurity investigations, abuse operations, and/or security incident response
14. Contributions to the security community (public research, blogging, presentations, bug bounty, etc.)
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Engineer, Information Security and Risk
Security engineer job in Columbia, SC
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Information Security Engineer
Security engineer job in Greer, SC
Proterra offers a dynamic and supportive workplace where our employees can thrive personally and professionally. With cutting-edge facilities and groundbreaking projects, Proterra offers unique opportunities to grow, collaborate, and lead transformative change in the electrification of heavy-duty transportation and equipment.
Our commitment to innovation extends beyond our battery solutions to our people, where we create an environment where everyone feels valued, supported, and empowered to drive change for the earth. Here at Proterra we strive to foster a culture of inclusivity, valuing diverse perspectives and encouraging bold ideas, allowing our employees to bring their full selves to work. Our employees benefit from competitive total rewards packages, and opportunities to develop professionally.
Position Overview:
The Information Security Engineer will be responsible for developing, enhancing, and executing Information Security Operations at Proterra. In this position you will assist with the maintenance and implementation of IT security systems to protect Proterra's corporate, manufacturing, cloud and IoT environments from cyber-attacks. You will maintain and lead incident response and escalations with our security operations center, be responsible for vulnerability management and participate in the creation or improvement of company security policies/ procedures. You will be responsible for conducting/leading risk assessments and participating in and supporting security assessments and audits. Additionally, you will be assisting with evaluation, setup and utilization of new security products and technologies.
About the Role - You will:
* Identify and analyze potential threat activity targeting client networks via monitoring systems, alerts, vulnerabilities, SIEM tools and network traffic and respond for immediate remediation.
* Work with cross functional teams to support security requirements to protect organization's corporate, manufacturing, cloud and IoT environments from cyber-attacks.
* Oversee and maintain existing security tools as well as overall enterprise security systems that include network and/or host-based intrusion detection systems, anti-virus/advanced EDR, SIEM/event correlation, file integrity monitoring, full packet captures, computer forensics, encryption, vulnerability management, data loss prevention and application scanning.
* Responsible for the coordination and actions needed for remediation generated by incident reports and manufacture recommended patching and hotfixes.
* Identify and analyze potential threat activity targeting client networks via monitoring systems, alerts, vulnerabilities, SIEM tools and network traffic and respond for immediate remediation.
* Work with cross functional teams to support security requirements to protect organization's corporate, manufacturing, cloud and IoT environments from cyber-attacks
* Oversee and maintain existing security tools as well as overall enterprise security systems that include network and/or host-based intrusion detection systems, anti-virus/advanced EDR, SIEM/event correlation, file integrity monitoring, full packet captures, computer forensics, encryption, vulnerability management, data loss prevention and application scanning.
* Responsible for the coordination and actions needed for remediation generated by incident reports and manufacture recommended patching and hotfixes.
* Assist Crowdstrike Falcon Complete team in remediation of critical information security incidents in coordination with 3rd party SOC team.
* Implement and maintain security controls and have a suitable knowledge of existing cyber threats to infrastructure and clouded environments.
* Participate in scheduled security assessment activities and projects to ensure industry compliance.
* Initiate and maintain Security Incident Response Plan (SIRT) and After-Action Reports (AARs) to maintain operational continuity
* Identify, analyze and interpret threat actors and malicious activity in client environments act upon and take the appropriate actions towards remediation and documentation.
* Differentiate between potential intrusion attempts and pinpoint false alarms by working with EDR, Identity Protection and NextGen SIEM to develop resolution plans.
* Perform 3rd party vendor assessments and fulfill Proterra security assessments requirements
* Triage and respond to security events - serve as a primary responder for incidents, taking ownership of incidents and tracking through resolution.
* Performs other related duties as assigned.
Your Experience Includes:
* 3-5 years of related information technology infrastructure experience with identity and access management [IAM], SSO solutions including (SAML 2, OAuth 2, OIDC).
* Some experience in securing enterprise networks, including firewalls, VPNs, intrusion detection/prevention systems (IDS/IPS), and secure network protocols (e.g., IPsec, SSL/TLS) heavy emphasis in SaaS apps such as Crowdstrike Falcon Complete, Netskope DLP, Nessus Tenable and asset management platforms such as Axionus.
* Overall Knowledge of endpoint protection technologies (e.g., anti-malware, EDR, DLP), and experience in managing and securing workstations, mobile devices, and servers.
* Have participated in penetration testing, vulnerability assessments, and red teaming exercises.
* General understating of industry standards, compliance, and legal requirements (ISO 27001, FedRAMP, NIST 800-171, NIST 800-53, SOC2, etc.)
* Excellent trouble-shooting abilities in software and hardware and be able to lead outage calls and trouble-shooting conversations until resolved and provide detailed root cause analysis reports.
* Above average understanding in vulnerability reporting using Saas platforms such as Nessus Tenable.
Education:
* Bachelor's degree in computer science, Information Security, Electrical Engineering or Management Information Systems preferred. Equivalent years of consecutive IT security experience with recognized industry certifications may be considered.
Certifications:
* CISSP, CASP+, SSCP+, or other relevant security certificates
* Certified Ethical Hacking (CEH) CISSP, CISA
* Network+, Security+, Linux+ or combination of similar certificates acceptable.
Applicants must be authorized to work for any employer in the U.S. There is no immigration sponsorship available for this role (ex: H1-B, OPT, CPT, TN or any other employment sponsorship).
#LI-BJ1
Cyber Security Analyst - Cyber Policy
Security engineer job in Aiken, SC
Savannah River National Laboratory (SRNL) is seeking an experienced cyber security policy professional to join the Cyber Assurance, Governance, Risk Management and Compliance team! The selected individual will serve as lead policy writer and subject-matter expert for the DOE-SRNL cybersecurity program.
Minimum Qualifications
Bachelor's degree in Cybersecurity, Information Management/Assurance, or related field
6 to 9 years of experience in Cybersecurity and Policy in a federal-contractor position
Excellent and proven writing skills in the cybersecurity field that show the ability to be clear and concise for complex topics. Samples provided may be redacted if needed.
For ability to obtain and maintain a security clearance, US Citizenship is Legally Required.
Preferred Qualifications
Expert knowledge of DOE 205.1x and Cyber Security Program Plans
Current or recent experience supporting DOE policies related to cybersecurity
Good interpersonal skills and demonstrated ability to work collaboratively in a team environment
Certifications in Cyber such as CISSP, CISM, CGRC (formerly ISC2 CAP), or CRISC.
Policy-focused certifications (GIAC-GLEG, GSLC or similar)
Strong attention to detail
Ability to learn new technologies, concepts, and processes quickly
Active DOE L clearance
Serve as principal author for all new and revised SRNL specific cybersecurity policies and procedures
Develop and maintain responses to contracts for DOE Orders and Cyber Security Program Plan
Review and advise as to impact to cybersecurity approved policies for other SRNL procedures with cybersecurity references
Assist ISSOs with creating and maintaining supplemental program documents, policies and procedures for multiple accreditation boundaries based on approved security controls
Perform gap analysis for draft, new, or updated federal mandates (EO 14028, BODS, OMB Memos) and write comprehensive summaries that support efficient decision making where needed
Support audits and assessments with policy evidence artifact/packages
Review cybersecurity training and develop newly identified training, keeping aligned with approved policies
Review and advise ISSOs additional documents such as Risk Assessments, Security Impact Analysis or others as requested.
Work effectively in a team environment and contribute to continuous process improvement efforts.
Participate/assist with compliance assessments/audits and data calls.
Interact with customers and peers in a professional and responsive manner.
Auto-Apply