Systems/Application Security Analyst jobs in South Carolina

Systems/Application Security Analyst analyzes information security systems and applications and finds the vulnerabilities. Recommends and develops security measures to protect information against unauthorized modification or loss. Being a Systems/Application Security Analyst coordinates with development teams or third parties to fix systems/application vulnerabilities. Requires a bachelor's degree. Additionally, Systems/Application Security Analyst typically reports to a manager or head of a unit/department. To be a Systems/Application Security Analyst typically requires 2 to 4 years of related experience. Gains exposure to some of the complex tasks within the job function. Occasionally directed in several aspects of the work. (Copyright 2024 Salary.com)

T
Security Analyst
  • TALENT Software Services
  • Blythewood, SC CONTRACTOR
  • Security Analyst
    Blythewood, SC 
    Job Description
    SCOPE OF THE PROJECT:
    Enhance the security posture of the South Carolina Department of Motor Vehicles (SCDMV) to protect sensitive citizen data and ensure the integrity of motor vehicle licensing and titling systems.


    DAILY DUTIES / RESPONSIBILITIES:
    1. PRIORITIZE AND PATCH VULNERABILITIES: ANALYZE REPORTS, IDENTIFY CRITICAL SYSTEMS, RECOMMEND PATCHES BASED ON RISK AND BEST PRACTICES, AUTOMATE DEPLOYMENT USING SCCM, GPO, OR POWERSHELL.
    2. HUNT FOR THREATS: LEVERAGE THREAT INTELLIGENCE FEEDS AND DEFENDER FOR ENDPOINT TO PROACTIVELY SEARCH FOR SUSPICIOUS ACTIVITY, INVESTIGATE POTENTIAL INDICATORS OF COMPROMISE, AND ESCALATE THREATS FOR INCIDENT RESPONSE.
    3. STAY INFORMED ON THREATS: CONTINUOUSLY UPDATE YOUR KNOWLEDGE OF CYBER THREATS THROUGH INTELLIGENCE FEEDS AND REPORTS, IDENTIFY POTENTIAL ATTACK VECTORS RELEVANT TO YOUR ORGANIZATION.
    4. EMPOWER EMPLOYEES: DEVELOP AND MAINTAIN SECURITY AWARENESS TRAINING, CONDUCT REGULAR TRAINING SESSIONS, SIMULATE PHISHING ATTACKS TO TEST AWARENESS, AND TRACK PARTICIPATION TO MEASURE PROGRAM EFFECTIVENESS.
    5. OPTIMIZE DEFENDER FOR ENDPOINT: CONFIGURE POLICIES FOR OPTIMAL THREAT DETECTION AND PREVENTION, MONITOR ALERTS AND INVESTIGATE INCIDENTS, MANAGE ENDPOINT PROTECTION SETTINGS ACROSS DEVICES, GENERATE REPORTS TO IDENTIFY SECURITY WEAKNESSES.
    6. REPORT SECURITY POSTURE: PROVIDE REGULAR REPORTS ON VULNERABILITY PATCHING, ONGOING THREAT HUNTS, AND SECURITY AWARENESS PROGRAM EFFECTIVENESS, INCLUDING KEY METRICS AND PROPOSED MITIGATION STRATEGIES FOR IDENTIFIED SECURITY GAPS.

    REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):
    • VULNERABILITY MANAGEMENT: ANALYZE REPORTS, PRIORITIZE PATCHING, UNDERSTAND NIST BEST PRACTICES.
    • THREAT HUNTING & INTELLIGENCE: UTILIZE THREAT FEEDS, INVESTIGATE SUSPICIOUS ACTIVITY, STAY CURRENT ON CYBER THREATS.
    • SECURITY AWARENESS TRAINING: DEVELOP & DELIVER TRAINING, ASSESS EMPLOYEE AWARENESS THROUGH SIMULATIONS.
    • SECURITY AUTOMATION: LEVERAGE SCCM, GPO, POWERSHELL FOR PATCH DEPLOYMENT.
    • ENDPOINT SECURITY (DEFENDER FOR ENDPOINT): CONFIGURE POLICIES, ANALYZE ALERTS, MANAGE ENDPOINT PROTECTION.
    • INCIDENT RESPONSE: IDENTIFY AND ESCALATE POTENTIAL SECURITY THREATS.
    • COMMUNICATION: DELIVER REPORTS ON SECURITY POSTURE AND PROPOSE MITIGATION STRATEGIES.
    • PROBLEM-SOLVING: ANALYZE DATA, IDENTIFY ANOMALIES, AND RECOMMEND SOLUTIONS.
    • ATTENTION TO DETAIL: ENSURE ACCURATE ANALYSIS AND CONFIGURATION FOR EFFECTIVE SECURITY MEASURES.

    PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
    • SCRIPTING: AUTOMATE TASKS BEYOND SCCM, GPO, AND POWERSHELL FOR INCREASED EFFICIENCY.
    • DIGITAL FORENSICS: INVESTIGATE SECURITY INCIDENTS AND COLLECT EVIDENCE FOR DEEPER ANALYSIS.
    • NETWORK SECURITY: UNDERSTAND NETWORK PROTOCOLS AND FIREWALLS TO STRENGTHEN OVERALL SECURITY POSTURE.
    • CLOUD SECURITY: AS CLOUD ADOPTION GROWS, UNDERSTANDING CLOUD-SPECIFIC SECURITY SOLUTIONS BECOMES VALUABLE.

    REQUIRED EDUCATION: A bachelor's degree in information technology systems, computer science, cybersecurity, or a related field with 3 years' experience in a security focused role. Relevant experience may be substituted for the degree on a year-for-year basis

    REQUIRED CERTIFICATIONS: Not required, however we prioritize applicants who have:
    • Certified Incident Handler (GCIH)
    • Certified Computer Security Incident Handler (CSIH)
    • EC-Council Certified Incident Handler (ECIH)
    • EC-Council Certified Network Defender (CND)
    • GIAC Critical Infrastructure Protection (GCIP)
    • GIAC Defensible Security Architecture (GDSA)
  • 9 Days Ago

Z
Security Analyst
  • Zeus
  • Orangeburg, SC FULL_TIME
  • Job SummaryThis position will be responsible for Zeus's security and compliance programs which will include vulnerability management, endpoint protection, email security, security awareness program, d...
  • 9 Days Ago

A
Security Analyst
  • Avani Technology Solutions Inc
  • Mount Pleasant, SC FULL_TIME
  • Company DescriptionLeading ClientJob DescriptionJob Title : Security AnalystLocation : Blythewood, South CarolinaDuration : 12 MonthsJob Description:Daily Duties / Responsibilities:1. Configure, optim...
  • 1 Day Ago

Z
CL - Security Analyst - Advanced Security Analyst - Advanced
  • Zencon Group
  • Blythewood, SC OTHER
  • Job Description:Remote Work Availability: 0%SCOPE OF THE PROJECT:Enhance the security posture of the South Carolina Department of Motor Vehicles (SCDMV) to protect sensitive citizen data and ensure th...
  • 9 Days Ago

C
Logistics Analyst with Security Clearance
  • ClearanceJobs
  • Charleston, SC FULL_TIME
  • POSITION: LOGISTICS ANALYST LOCATION: NIWC-LANT – Common Submarine Radio Room (CSRR)COMPANY: DEL REY Systems and Technology, Inc. – Charleston, South Carolina DEL REY Systems and Technology, Inc. is a...
  • 2 Days Ago

F
LU - Security Analyst - (4-20)
  • Focused HR Solutions
  • Columbia, SC FULL_TIME
  • This job is 100% on-site in Columbia, SCOur direct client has an opening for a Security Analyst -11160-1This position is 12 months, with the option of extension, and is in the following locations in C...
  • 2 Days Ago

A
Information System Security Analyst
  • Avid Technology Professionals
  • Pensacola, FL
  • This position requires shift work including nights/weekends Responsibilities include: Provide support in the real-time d...
  • 6/11/2024 12:00:00 AM

F
Senior Business Systems Security Analyst (Hybrid Preferred / Remote Possible)
  • First American
  • Santa Ana, CA
  • Who We Are Join a team that puts its People First! Since 1889, First American (NYSE: FAF) has held an unwavering belief ...
  • 6/11/2024 12:00:00 AM

R
Information System Security Analyst
  • Resource Management Concepts, Inc.
  • Dahlgren, VA
  • Resource Management Concepts, Inc. (RMC) provides high-quality, professional services to government and commercial secto...
  • 6/10/2024 12:00:00 AM

N
Cyber Security Incident Responder/Information System Security Analyst
  • Node.Digital
  • Pensacola, FL
  • Cyber Security Incident Responder/Information System Security Analyst Location: Pensacola, FL Must have active Top Secre...
  • 6/9/2024 12:00:00 AM

S
Cyber Security Systems Analyst III
  • Scientific Research Corporation
  • Charleston, SC
  • Job Description PRIMARY DUTIES RESPONSIBILITIES: Provides comprehensive Cyber Security services during the development, ...
  • 6/9/2024 12:00:00 AM

C
Job 61 Info System Security Analyst Principal II
  • CYBER CODE MASTERS LLC
  • Arlington, VA
  • Job Description Job Description This is an URGENT job posting. Responsibilities include: - Providing 24 x 7 watch suppor...
  • 6/7/2024 12:00:00 AM

C
Job 59 Info System Security Analyst Senior II
  • CYBER CODE MASTERS LLC
  • Arlington, VA
  • Benefits: 401(k) matching Health insurance This Urgent position requires shift work including nights/weekends Responsibi...
  • 6/7/2024 12:00:00 AM

C
Job 59 Info System Security Analyst Senior II
  • CYBER CODE MASTERS LLC
  • Arlington, VA
  • Job Description Job Description This Urgent position requires shift work including nights/weekends Responsibilities will...
  • 6/7/2024 12:00:00 AM

South Carolina (/ˌkærəˈlaɪnə/ (listen)) is a state in the Southeastern United States and the easternmost of the Deep South. It is bordered to the north by North Carolina, to the southeast by the Atlantic Ocean, and to the southwest by Georgia across the Savannah River. South Carolina became the eighth state to ratify the U.S. Constitution on May 23, 1788. South Carolina became the first state to vote in favor of secession from the Union on December 20, 1860. After the American Civil War, it was readmitted into the United States on June 25, 1868. South Carolina is the 40th most extensive and 23...
Source: Wikipedia (as of 04/11/2019). Read more from Wikipedia
Income Estimation for Systems/Application Security Analyst jobs
$72,446 to $101,014

Systems/Application Security Analyst in Colorado Springs, CO
Position SummaryReporting to the Director of Identity and Directory Services, the Application Security Analyst will be part of the Identity and Directory Services team and will also work closely with the Information Security Office.
January 22, 2020
The OIG’s information resources are sensitive assets and are critical in the performance of its mission; therefore, information security services help safeguard the information resources entrusted to the OIG.
January 11, 2020
Systems/Application Security Analyst in Battle Creek, MI
Any application missing the above documents/information may be considered incomplete.
February 16, 2020
Systems/Application Security Analyst in Fayetteville, AR
The Application Security Analyst is responsible for scanning web applications against vulnerabilities and attacks.
December 09, 2019