Home       |     Overview      |     Candidate Login      |     Post Resume       |     Contact us
 
  
     
     
Search Jobs
     
Keywords,Title,Skills,Company  Location,City,State,Zip  
  Advanced Search
     
Executive Order 11246, Section 503 & VEVRAA EOE, including disability/vets
Cybersecurity Windows Server Network Security Information Security Analyst
(Jobs
 
Requirement id 146688
Job title Analyst
Job location in Blythewood, SC
Skills required Cyber Security, IT Security, not found, Windows Server Network Security Informat
Open Date 05-Apr-2024
Close Date
Job type Contract
Duration 12 Months
Compensation DOE
Status requirement ---
Job interview type ---
Apply
   Email Recruiter: coolsoft
Job Description Analyst: Cyber Security, IT Security, not found, Windows Server Network Security Informat

start date :MAY 3RD 2024

submission deadline :4/12/2024

client info :Department of Motor Vehicles

Note:


* INTERVIEW PROCESS (WHO WILL CONDUCT I/V, PHONE OR IN-PERSON, HOW MANY ROUNDS OF I/VS)?

• Security Team Manager
• In-person preferred but will be willing to accommodate highly qualified candidates.
• 2 rounds of interviews possible

* SCHEDULE INTERVIEW: HOW SOON CAN YOU SCHEDULE AN INTERVIEW (DATE / TIMES)?

- ASAP



Description :

Enhance the security posture of the South Carolina Department of Motor Vehicles (SCDMV) to protect sensitive citizen data and ensure the integrity of motor vehicle licensing and titling systems.


DAILY DUTIES / RESPONSIBILITIES:
1. PRIORITIZE AND PATCH VULNERABILITIES: ANALYZE REPORTS, IDENTIFY CRITICAL SYSTEMS, RECOMMEND PATCHES BASED ON RISK AND BEST PRACTICES, AUTOMATE DEPLOYMENT USING SCCM, GPO, OR POWERSHELL.
2. HUNT FOR THREATS: LEVERAGE THREAT INTELLIGENCE FEEDS AND DEFENDER FOR ENDPOINT TO PROACTIVELY SEARCH FOR SUSPICIOUS ACTIVITY, INVESTIGATE POTENTIAL INDICATORS OF COMPROMISE, AND ESCALATE THREATS FOR INCIDENT RESPONSE.
3. STAY INFORMED ON THREATS: CONTINUOUSLY UPDATE YOUR KNOWLEDGE OF CYBER THREATS THROUGH INTELLIGENCE FEEDS AND REPORTS, IDENTIFY POTENTIAL ATTACK VECTORS RELEVANT TO YOUR ORGANIZATION.
4. EMPOWER EMPLOYEES: DEVELOP AND MAINTAIN SECURITY AWARENESS TRAINING, CONDUCT REGULAR TRAINING SESSIONS, SIMULATE PHISHING ATTACKS TO TEST AWARENESS, AND TRACK PARTICIPATION TO MEASURE PROGRAM EFFECTIVENESS.
5. OPTIMIZE DEFENDER FOR ENDPOINT: CONFIGURE POLICIES FOR OPTIMAL THREAT DETECTION AND PREVENTION, MONITOR ALERTS AND INVESTIGATE INCIDENTS, MANAGE ENDPOINT PROTECTION SETTINGS ACROSS DEVICES, GENERATE REPORTS TO IDENTIFY SECURITY WEAKNESSES.
6. REPORT SECURITY POSTURE: PROVIDE REGULAR REPORTS ON VULNERABILITY PATCHING, ONGOING THREAT HUNTS, AND SECURITY AWARENESS PROGRAM EFFECTIVENESS, INCLUDING KEY METRICS AND PROPOSED MITIGATION STRATEGIES FOR IDENTIFIED SECURITY GAPS.

REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):
• VULNERABILITY MANAGEMENT: ANALYZE REPORTS, PRIORITIZE PATCHING, UNDERSTAND NIST BEST PRACTICES.
• THREAT HUNTING & INTELLIGENCE: UTILIZE THREAT FEEDS, INVESTIGATE SUSPICIOUS ACTIVITY, STAY CURRENT ON CYBER THREATS.
• SECURITY AWARENESS TRAINING: DEVELOP & DELIVER TRAINING, ASSESS EMPLOYEE AWARENESS THROUGH SIMULATIONS.
• SECURITY AUTOMATION: LEVERAGE SCCM, GPO, POWERSHELL FOR PATCH DEPLOYMENT.
• ENDPOINT SECURITY (DEFENDER FOR ENDPOINT): CONFIGURE POLICIES, ANALYZE ALERTS, MANAGE ENDPOINT PROTECTION.
• INCIDENT RESPONSE: IDENTIFY AND ESCALATE POTENTIAL SECURITY THREATS.
• COMMUNICATION: DELIVER REPORTS ON SECURITY POSTURE AND PROPOSE MITIGATION STRATEGIES.
• PROBLEM-SOLVING: ANALYZE DATA, IDENTIFY ANOMALIES, AND RECOMMEND SOLUTIONS.
• ATTENTION TO DETAIL: ENSURE ACCURATE ANALYSIS AND CONFIGURATION FOR EFFECTIVE SECURITY MEASURES.

PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
• SCRIPTING: AUTOMATE TASKS BEYOND SCCM, GPO, AND POWERSHELL FOR INCREASED EFFICIENCY.
• DIGITAL FORENSICS: INVESTIGATE SECURITY INCIDENTS AND COLLECT EVIDENCE FOR DEEPER ANALYSIS.
• NETWORK SECURITY: UNDERSTAND NETWORK PROTOCOLS AND FIREWALLS TO STRENGTHEN OVERALL SECURITY POSTURE.
• CLOUD SECURITY: AS CLOUD ADOPTION GROWS, UNDERSTANDING CLOUD-SPECIFIC SECURITY SOLUTIONS BECOMES VALUABLE.

REQUIRED EDUCATION: A bachelors degree in information technology systems, computer science, cybersecurity, or a related field with 3+ years experience in a security focused role. Relevant experience may be substituted for the degree on a year-for-year basis

REQUIRED CERTIFICATIONS: Not required, however we prioritize applicants who have:
• Certified Incident Handler (GCIH)
 
Call 502-379-4456 Ext 100 for more details. Please provide Requirement id: 146688 while calling.
 
Other jobs in SC: Beaufort (1), Blythewod (2), Blythewood (3), Charleston (17), Columbia (37), Greenville (4), Hartsville (2), North Charleston (2), Overland Park (1), San Francisco (1), SENECA (4), South Carolina (1), Spartanburg (3), Unknown (2),
 
 Cyber Security job openings in other states
Jobs List

Cybersecurity - 110.7-25-106
Create date: 06-Nov-2025
Title: Cybersecurity and Information Security Services

Start date : 12/1/2025

Submission deadline : 11/13/2025

Client Info : Management & Budget, Office of

Description :

The State of North Dakota acting through its Office of Management and Budget, State Procurement Office, intends join Cyberse.... (This job is for - CybersecurityManagement Jobs in ND Bismarck Consultant - (in Bismarck, ND))

GA DHS - Information Security Analyst (776405)
Create date: 11-Sep-2025
Start date : 10/13/2025

End Date : 06/30/2026

Submission deadline : 09/17/2025

Client Info : DHS

Note:

* Agency Interview Type : Web Cam Interview Only

* Hybrid

Description :

This role is responsible for monitoring, detecting, analyzing, and responding to secur.... (This job is for - Cybersecurity Jobs in GA Atlanta Analyst - (in Atlanta, GA))

Security Analyst II - 146269
Create date: 19-Aug-2025
Start Date :9/22/2025
End Date :06/30/2026

Submission Deadline :08/26/2025 4:00 PM CST.

Client Info : WHS

Note:

* Interview Process: Microsoft Teams with Video.

* Duration: 6/30/26 with possibility of extensions.

* Onsite or Remote? Candidates MUST be WI resi.... (This job is for - CybersecuritySplunk Jobs in WI Madison Analyst - (in Madison, WI))

VDOT - IT Security Analyst 2 (773651)
Create date: 12-Aug-2025
Start Date :9/8/2025
End Date :09/09/2026

Submission Deadline :8/15/2025

Client Info : VDOT

Note:

* Work Arrangement: Hybrid

* Agency Interview Type: In Person Only

Description :

we are seeking a highly motivated Security Analyst to support cyberse.... (This job is for - Cybersecurity Jobs in VA Richmond Analyst - (in Richmond, VA))

CMMC Compliance Bid - 459-2026
Create date: 04-Aug-2025
Start Date :9/8/2025

Submission Deadline :8/19/2025

Client Info : University of North Dakota (UND)

Description : we are seeking a qualified partner to support its efforts toward achieving Cybersecurity Maturity Model Certification (CMMC) compliance. (This job is for - Cybersecurity Jobs in ND GrandForks Consultant - (in Grand Forks, ND))
 
 Cyber Security job openings in SC
Jobs List

SECURITY ANALYST -CONSULTANT -11624-1
Create date: 27-Mar-2025
Job Title: SECURITY ANALYST – CONSULTANT (INFO SYS SECURITY OFFICER – ISSO)-11624-1

Start date : MAY 13, 2025

Submission deadline : 4/3/2025

Client Info : Department of Health and Human Services

Note:

:::::Important Notes -- Please read before submitting candidates:::::

1 - Resumes s.... (This job is for - Cybersecurity FISMA Jobs in SC Columbia Analyst - (in Columbia, SC))

SECURITY ANALYST -CONSULTANT (ISSO TEAM LEAD)
Create date: 03-Mar-2025
No of Submissions : 2

Start date : MARCH 31, 2025

Submission deadline : 3/10/2025

Client Info : Department of Health and Human Services

Note:

Q) INTERVIEW PROCESS (phone, video or in-person, how many rounds of i/vs, etc.)

A) In-person or video for initial interview. Phone may be used.... (This job is for - Cybersecurity FISMA Jobs in SC Columbia Analyst - (in Columbia, SC))

SECURITY ANALYST (CONSULTANT) - 11500-1
Create date: 03-Jan-2025
No of Submissions : 2

Start date : 2/11/2025

Submission deadline : 1/10/2025

Client Info : Department of Health and Human Services

Note:

Q) INTERVIEW PROCESS (phone, video or in-person, how many rounds of i/vs, etc.)

A) In-person or video for initial interview. Phone may be used for .... (This job is for - Cybersecurity FISMA Jobs in SC Columbia Architect - (in Columbia, SC))

SOC SECURITY ANALYST-11477-1
Create date: 10-Dec-2024
No of Submissions : 4

Start date : 01/04/2026

Submission deadline : 12/19/2024

Client Info : Department of Revenue

Note:

Q) INTERVIEW PROCESS (phone, video, or in-person, how many rounds of i/vs, etc.)?

A) 1, 2, possibly 3 interviews via phone and/or video. Local candidates can be .... (This job is for - Cybersecurity Jobs in SC Columbia Analyst - (in Columbia, SC))

SECURITY ARCHITECT - CONSULTANT-11455-1
Create date: 22-Nov-2024
Candidate Submission Limit Per Supplier : 2

Start date : 12/01/2024

Submission deadline : 11/29/2024

Client Info : Department of Administration

Note:

Q) INTERVIEW PROCESS (phone, video or in-person, how many rounds of i/vs, etc.)?

A) INITIAL ROUND OF INTERVIEWS ON MICROSOFT TEAMS (ON.... (This job is for - Cybersecurity Linus Jobs in SC COLUMBIA Consultant - (in Columbia, SC))
(Analyst: Cyber Security, IT Security, not found, Windows Server Network Security Informat in Blythewood, SC)
     
Search Jobs
     
Keywords,Title,Skills,Company  Location,City,State,Zip  
  Advanced Search
     

    About Us     Services    Privacy policy    Legal     Contact us