Home       |     Overview      |     Candidate Login      |     Post Resume       |     Contact us
 
  
     
     
Search Jobs
     
Keywords,Title,Skills,Company  Location,City,State,Zip  
  Advanced Search
     
Executive Order 11246, Section 503 & VEVRAA EOE, including disability/vets
Cybersecurity Windows Server Network Security Information Security Analyst
(Jobs
 
Requirement id 146688
Job title Analyst
Job location in Blythewood, SC
Skills required Cyber Security, IT Security, not found, Windows Server Network Security Informat
Open Date 05-Apr-2024
Close Date
Job type Contract
Duration 12 Months
Compensation DOE
Status requirement ---
Job interview type ---
Apply
   Email Recruiter: coolsoft
Job Description Analyst: Cyber Security, IT Security, not found, Windows Server Network Security Informat

start date :MAY 3RD 2024

submission deadline :4/12/2024

client info :Department of Motor Vehicles

Note:


* INTERVIEW PROCESS (WHO WILL CONDUCT I/V, PHONE OR IN-PERSON, HOW MANY ROUNDS OF I/VS)?

• Security Team Manager
• In-person preferred but will be willing to accommodate highly qualified candidates.
• 2 rounds of interviews possible

* SCHEDULE INTERVIEW: HOW SOON CAN YOU SCHEDULE AN INTERVIEW (DATE / TIMES)?

- ASAP



Description :

Enhance the security posture of the South Carolina Department of Motor Vehicles (SCDMV) to protect sensitive citizen data and ensure the integrity of motor vehicle licensing and titling systems.


DAILY DUTIES / RESPONSIBILITIES:
1. PRIORITIZE AND PATCH VULNERABILITIES: ANALYZE REPORTS, IDENTIFY CRITICAL SYSTEMS, RECOMMEND PATCHES BASED ON RISK AND BEST PRACTICES, AUTOMATE DEPLOYMENT USING SCCM, GPO, OR POWERSHELL.
2. HUNT FOR THREATS: LEVERAGE THREAT INTELLIGENCE FEEDS AND DEFENDER FOR ENDPOINT TO PROACTIVELY SEARCH FOR SUSPICIOUS ACTIVITY, INVESTIGATE POTENTIAL INDICATORS OF COMPROMISE, AND ESCALATE THREATS FOR INCIDENT RESPONSE.
3. STAY INFORMED ON THREATS: CONTINUOUSLY UPDATE YOUR KNOWLEDGE OF CYBER THREATS THROUGH INTELLIGENCE FEEDS AND REPORTS, IDENTIFY POTENTIAL ATTACK VECTORS RELEVANT TO YOUR ORGANIZATION.
4. EMPOWER EMPLOYEES: DEVELOP AND MAINTAIN SECURITY AWARENESS TRAINING, CONDUCT REGULAR TRAINING SESSIONS, SIMULATE PHISHING ATTACKS TO TEST AWARENESS, AND TRACK PARTICIPATION TO MEASURE PROGRAM EFFECTIVENESS.
5. OPTIMIZE DEFENDER FOR ENDPOINT: CONFIGURE POLICIES FOR OPTIMAL THREAT DETECTION AND PREVENTION, MONITOR ALERTS AND INVESTIGATE INCIDENTS, MANAGE ENDPOINT PROTECTION SETTINGS ACROSS DEVICES, GENERATE REPORTS TO IDENTIFY SECURITY WEAKNESSES.
6. REPORT SECURITY POSTURE: PROVIDE REGULAR REPORTS ON VULNERABILITY PATCHING, ONGOING THREAT HUNTS, AND SECURITY AWARENESS PROGRAM EFFECTIVENESS, INCLUDING KEY METRICS AND PROPOSED MITIGATION STRATEGIES FOR IDENTIFIED SECURITY GAPS.

REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):
• VULNERABILITY MANAGEMENT: ANALYZE REPORTS, PRIORITIZE PATCHING, UNDERSTAND NIST BEST PRACTICES.
• THREAT HUNTING & INTELLIGENCE: UTILIZE THREAT FEEDS, INVESTIGATE SUSPICIOUS ACTIVITY, STAY CURRENT ON CYBER THREATS.
• SECURITY AWARENESS TRAINING: DEVELOP & DELIVER TRAINING, ASSESS EMPLOYEE AWARENESS THROUGH SIMULATIONS.
• SECURITY AUTOMATION: LEVERAGE SCCM, GPO, POWERSHELL FOR PATCH DEPLOYMENT.
• ENDPOINT SECURITY (DEFENDER FOR ENDPOINT): CONFIGURE POLICIES, ANALYZE ALERTS, MANAGE ENDPOINT PROTECTION.
• INCIDENT RESPONSE: IDENTIFY AND ESCALATE POTENTIAL SECURITY THREATS.
• COMMUNICATION: DELIVER REPORTS ON SECURITY POSTURE AND PROPOSE MITIGATION STRATEGIES.
• PROBLEM-SOLVING: ANALYZE DATA, IDENTIFY ANOMALIES, AND RECOMMEND SOLUTIONS.
• ATTENTION TO DETAIL: ENSURE ACCURATE ANALYSIS AND CONFIGURATION FOR EFFECTIVE SECURITY MEASURES.

PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
• SCRIPTING: AUTOMATE TASKS BEYOND SCCM, GPO, AND POWERSHELL FOR INCREASED EFFICIENCY.
• DIGITAL FORENSICS: INVESTIGATE SECURITY INCIDENTS AND COLLECT EVIDENCE FOR DEEPER ANALYSIS.
• NETWORK SECURITY: UNDERSTAND NETWORK PROTOCOLS AND FIREWALLS TO STRENGTHEN OVERALL SECURITY POSTURE.
• CLOUD SECURITY: AS CLOUD ADOPTION GROWS, UNDERSTANDING CLOUD-SPECIFIC SECURITY SOLUTIONS BECOMES VALUABLE.

REQUIRED EDUCATION: A bachelors degree in information technology systems, computer science, cybersecurity, or a related field with 3+ years experience in a security focused role. Relevant experience may be substituted for the degree on a year-for-year basis

REQUIRED CERTIFICATIONS: Not required, however we prioritize applicants who have:
• Certified Incident Handler (GCIH)
 
Call 502-379-4456 Ext 100 for more details. Please provide Requirement id: 146688 while calling.
 
Other jobs in SC: Beaufort (1), Blythewod (2), Blythewood (3), Charleston (17), Columbia (37), Greenville (4), Hartsville (2), North Charleston (2), Overland Park (1), San Francisco (1), SENECA (4), South Carolina (1), Spartanburg (3), Unknown (2),
 
 Cyber Security job openings in other states
Jobs List

Network Engineer III - 138226
Create date: 17-Dec-2024
No of Submissions : 2

Start date : 12/02/2024

End Date : 06/30/2025

Submission deadline : 12/26/2024 4:00:00 PM

Client Info : Supreme Court

Note:

* Interview Process: via Teams

* Duration of the Contract: 6/30/2025, with potential for extension

* Onsite .... (This job is for - Cybersecurity Design Jobs in WI Madison Engineer - (in Madison, WI))

VDH Cybersecurity Engineer 3 (752757)
Create date: 16-Dec-2024
Remote

No of Submissions : 2

Start date : 12/16/2024

End Date : 06/30/2025

Submission deadline : 12/19/2024

Client Info : VDH

Note:

* Agency Interview Type: Web Cam Interview Only

Description :

Pentest

PerformPentest on VDH Application in a.... (This job is for - Cybersecurity Jobs in VA Richmond Engineer - (in Richmond, VA))

DCH IT Manager 2/Cybersecurity Audit Manager (752639)
Create date: 11-Dec-2024
No of Submissions : 2

Start date : 12/30/2024

End Date : 06/30/2025

Submission deadline : 12/16/2024

Client Info : DCH

Note:

* Agency Interview Type : Either Web Cam or In Person

* Hybrid

Description :


HYBRID: ON-SITE TWO DAYS PER WEEK.
PO.... (This job is for - Cybersecurity Management Jobs in GA Atlanta Manager - (in Atlanta, GA))

DCH IT Manager 2/Cybersecurity Audit Manager (750588)
Create date: 09-Dec-2024
No of Submissions : 2

Start date : 11/18/2024

End Date : 11/21/2025

Submission deadline : 12/12/2024

Client Info : DCH

Note:

* Agency Interview Type : Either Web Cam or In Person

* Hybrid

Description :


HYBRID: ON-SITE TWO DAYS PER WEEK.
<.... (This job is for - Cybersecurity Management Jobs in GA Atlanta Manager - (in Atlanta, GA))

VDOT IT Security Architect Lead (749945)
Create date: 11-Nov-2024
No of Submissions : 2

Start date : 12/02/2024

End Date : 06/30/2025

Submission deadline : 11/14/2024



Note:

* Agency Interview Type : In Person Only

* Hybrid

* Hybrid schedule for this role is mostly full time remote work with quarterly in-person meetings with .... (This job is for - Cybersecurity Jobs in VA Richmond Architect - (in Richmond, VA))
 
 Cyber Security job openings in SC
Jobs List

SECURITY ANALYST -CONSULTANT -11624-1
Create date: 27-Mar-2025
Job Title: SECURITY ANALYST – CONSULTANT (INFO SYS SECURITY OFFICER – ISSO)-11624-1

Start date : MAY 13, 2025

Submission deadline : 4/3/2025

Client Info : Department of Health and Human Services

Note:

:::::Important Notes -- Please read before submitting candidates:::::

1 - Resumes s.... (This job is for - Cybersecurity FISMA Jobs in SC Columbia Analyst - (in Columbia, SC))

SECURITY ANALYST -CONSULTANT (ISSO TEAM LEAD)
Create date: 03-Mar-2025
No of Submissions : 2

Start date : MARCH 31, 2025

Submission deadline : 3/10/2025

Client Info : Department of Health and Human Services

Note:

Q) INTERVIEW PROCESS (phone, video or in-person, how many rounds of i/vs, etc.)

A) In-person or video for initial interview. Phone may be used.... (This job is for - Cybersecurity FISMA Jobs in SC Columbia Analyst - (in Columbia, SC))

SECURITY ANALYST (CONSULTANT) - 11500-1
Create date: 03-Jan-2025
No of Submissions : 2

Start date : 2/11/2025

Submission deadline : 1/10/2025

Client Info : Department of Health and Human Services

Note:

Q) INTERVIEW PROCESS (phone, video or in-person, how many rounds of i/vs, etc.)

A) In-person or video for initial interview. Phone may be used for .... (This job is for - Cybersecurity FISMA Jobs in SC Columbia Architect - (in Columbia, SC))

SOC SECURITY ANALYST-11477-1
Create date: 10-Dec-2024
No of Submissions : 4

Start date : 01/04/2026

Submission deadline : 12/19/2024

Client Info : Department of Revenue

Note:

Q) INTERVIEW PROCESS (phone, video, or in-person, how many rounds of i/vs, etc.)?

A) 1, 2, possibly 3 interviews via phone and/or video. Local candidates can be .... (This job is for - Cybersecurity Jobs in SC Columbia Analyst - (in Columbia, SC))

SECURITY ARCHITECT - CONSULTANT-11455-1
Create date: 22-Nov-2024
Candidate Submission Limit Per Supplier : 2

Start date : 12/01/2024

Submission deadline : 11/29/2024

Client Info : Department of Administration

Note:

Q) INTERVIEW PROCESS (phone, video or in-person, how many rounds of i/vs, etc.)?

A) INITIAL ROUND OF INTERVIEWS ON MICROSOFT TEAMS (ON.... (This job is for - Cybersecurity Linus Jobs in SC COLUMBIA Consultant - (in Columbia, SC))
(Analyst: Cyber Security, IT Security, not found, Windows Server Network Security Informat in Blythewood, SC)
     
Search Jobs
     
Keywords,Title,Skills,Company  Location,City,State,Zip  
  Advanced Search
     

    About Us     Services    Privacy policy    Legal     Contact us