Systems/Application Security Analyst, Sr. jobs in South Carolina

Systems/Application Security Analyst, Sr. analyzes information security systems and applications and finds the vulnerabilities. Recommends and develops security measures to protect information against unauthorized modification or loss. Being a Systems/Application Security Analyst, Sr. coordinates with development teams or third parties to fix systems/application vulnerabilities. Requires a bachelor's degree. Additionally, Systems/Application Security Analyst, Sr. typically reports to a manager. The Systems/Application Security Analyst, Sr. contributes to moderately complex aspects of a project. Work is generally independent and collaborative in nature. To be a Systems/Application Security Analyst, Sr. typically requires 4 to 7 years of related experience. (Copyright 2024 Salary.com)

T
Security Analyst
  • TALENT Software Services
  • Blythewood, SC CONTRACTOR
  • Security Analyst
    Blythewood, SC 
    Job Description
    SCOPE OF THE PROJECT:
    Enhance the security posture of the South Carolina Department of Motor Vehicles (SCDMV) to protect sensitive citizen data and ensure the integrity of motor vehicle licensing and titling systems.


    DAILY DUTIES / RESPONSIBILITIES:
    1. PRIORITIZE AND PATCH VULNERABILITIES: ANALYZE REPORTS, IDENTIFY CRITICAL SYSTEMS, RECOMMEND PATCHES BASED ON RISK AND BEST PRACTICES, AUTOMATE DEPLOYMENT USING SCCM, GPO, OR POWERSHELL.
    2. HUNT FOR THREATS: LEVERAGE THREAT INTELLIGENCE FEEDS AND DEFENDER FOR ENDPOINT TO PROACTIVELY SEARCH FOR SUSPICIOUS ACTIVITY, INVESTIGATE POTENTIAL INDICATORS OF COMPROMISE, AND ESCALATE THREATS FOR INCIDENT RESPONSE.
    3. STAY INFORMED ON THREATS: CONTINUOUSLY UPDATE YOUR KNOWLEDGE OF CYBER THREATS THROUGH INTELLIGENCE FEEDS AND REPORTS, IDENTIFY POTENTIAL ATTACK VECTORS RELEVANT TO YOUR ORGANIZATION.
    4. EMPOWER EMPLOYEES: DEVELOP AND MAINTAIN SECURITY AWARENESS TRAINING, CONDUCT REGULAR TRAINING SESSIONS, SIMULATE PHISHING ATTACKS TO TEST AWARENESS, AND TRACK PARTICIPATION TO MEASURE PROGRAM EFFECTIVENESS.
    5. OPTIMIZE DEFENDER FOR ENDPOINT: CONFIGURE POLICIES FOR OPTIMAL THREAT DETECTION AND PREVENTION, MONITOR ALERTS AND INVESTIGATE INCIDENTS, MANAGE ENDPOINT PROTECTION SETTINGS ACROSS DEVICES, GENERATE REPORTS TO IDENTIFY SECURITY WEAKNESSES.
    6. REPORT SECURITY POSTURE: PROVIDE REGULAR REPORTS ON VULNERABILITY PATCHING, ONGOING THREAT HUNTS, AND SECURITY AWARENESS PROGRAM EFFECTIVENESS, INCLUDING KEY METRICS AND PROPOSED MITIGATION STRATEGIES FOR IDENTIFIED SECURITY GAPS.

    REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):
    • VULNERABILITY MANAGEMENT: ANALYZE REPORTS, PRIORITIZE PATCHING, UNDERSTAND NIST BEST PRACTICES.
    • THREAT HUNTING & INTELLIGENCE: UTILIZE THREAT FEEDS, INVESTIGATE SUSPICIOUS ACTIVITY, STAY CURRENT ON CYBER THREATS.
    • SECURITY AWARENESS TRAINING: DEVELOP & DELIVER TRAINING, ASSESS EMPLOYEE AWARENESS THROUGH SIMULATIONS.
    • SECURITY AUTOMATION: LEVERAGE SCCM, GPO, POWERSHELL FOR PATCH DEPLOYMENT.
    • ENDPOINT SECURITY (DEFENDER FOR ENDPOINT): CONFIGURE POLICIES, ANALYZE ALERTS, MANAGE ENDPOINT PROTECTION.
    • INCIDENT RESPONSE: IDENTIFY AND ESCALATE POTENTIAL SECURITY THREATS.
    • COMMUNICATION: DELIVER REPORTS ON SECURITY POSTURE AND PROPOSE MITIGATION STRATEGIES.
    • PROBLEM-SOLVING: ANALYZE DATA, IDENTIFY ANOMALIES, AND RECOMMEND SOLUTIONS.
    • ATTENTION TO DETAIL: ENSURE ACCURATE ANALYSIS AND CONFIGURATION FOR EFFECTIVE SECURITY MEASURES.

    PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
    • SCRIPTING: AUTOMATE TASKS BEYOND SCCM, GPO, AND POWERSHELL FOR INCREASED EFFICIENCY.
    • DIGITAL FORENSICS: INVESTIGATE SECURITY INCIDENTS AND COLLECT EVIDENCE FOR DEEPER ANALYSIS.
    • NETWORK SECURITY: UNDERSTAND NETWORK PROTOCOLS AND FIREWALLS TO STRENGTHEN OVERALL SECURITY POSTURE.
    • CLOUD SECURITY: AS CLOUD ADOPTION GROWS, UNDERSTANDING CLOUD-SPECIFIC SECURITY SOLUTIONS BECOMES VALUABLE.

    REQUIRED EDUCATION: A bachelor's degree in information technology systems, computer science, cybersecurity, or a related field with 3 years' experience in a security focused role. Relevant experience may be substituted for the degree on a year-for-year basis

    REQUIRED CERTIFICATIONS: Not required, however we prioritize applicants who have:
    • Certified Incident Handler (GCIH)
    • Certified Computer Security Incident Handler (CSIH)
    • EC-Council Certified Incident Handler (ECIH)
    • EC-Council Certified Network Defender (CND)
    • GIAC Critical Infrastructure Protection (GCIP)
    • GIAC Defensible Security Architecture (GDSA)
  • 9 Days Ago

Z
Security Analyst
  • Zeus
  • Orangeburg, SC FULL_TIME
  • Job SummaryThis position will be responsible for Zeus's security and compliance programs which will include vulnerability management, endpoint protection, email security, security awareness program, d...
  • 9 Days Ago

A
Security Analyst
  • Avani Technology Solutions Inc
  • Mount Pleasant, SC FULL_TIME
  • Company DescriptionLeading ClientJob DescriptionJob Title : Security AnalystLocation : Blythewood, South CarolinaDuration : 12 MonthsJob Description:Daily Duties / Responsibilities:1. Configure, optim...
  • 1 Day Ago

O
Sr. IT & Security Engineer
  • Omatic
  • Pleasant, SC FULL_TIME
  • Role Overview:Reporting to the Director of IT & Security, this role will be an IT business enabler, responsible for implementing, maintaining, and improving the corporate technology used by employees....
  • Just Posted

I
Sr. Financial Analyst
  • Integrated Power Services
  • Greenville, SC FULL_TIME
  • Who We Are: Integrated Power Services (IPS) is the leading North American solution provider for power management, electro-mechanical and rotating assets. Serving customers across a wide range of indus...
  • 2 Days Ago

A
Sr Analyst Media Analytics
  • Amsive
  • Greenville, SC FULL_TIME
  • Who We AreAt Amsive, we're more than just a performance marketing agency; we're a team that thrives on collaboration and innovation. We offer a supportive environment where personal growth is just as ...
  • 2 Days Ago

A
Information System Security Analyst
  • Avid Technology Professionals
  • Pensacola, FL
  • This position requires shift work including nights/weekends Responsibilities include: Provide support in the real-time d...
  • 6/11/2024 12:00:00 AM

F
Senior Business Systems Security Analyst (Hybrid Preferred / Remote Possible)
  • First American
  • Santa Ana, CA
  • Who We Are Join a team that puts its People First! Since 1889, First American (NYSE: FAF) has held an unwavering belief ...
  • 6/11/2024 12:00:00 AM

R
Information System Security Analyst
  • Resource Management Concepts, Inc.
  • Dahlgren, VA
  • Resource Management Concepts, Inc. (RMC) provides high-quality, professional services to government and commercial secto...
  • 6/10/2024 12:00:00 AM

N
Cyber Security Incident Responder/Information System Security Analyst
  • Node.Digital
  • Pensacola, FL
  • Cyber Security Incident Responder/Information System Security Analyst Location: Pensacola, FL Must have active Top Secre...
  • 6/9/2024 12:00:00 AM

S
Cyber Security Systems Analyst III
  • Scientific Research Corporation
  • Charleston, SC
  • Job Description PRIMARY DUTIES RESPONSIBILITIES: Provides comprehensive Cyber Security services during the development, ...
  • 6/9/2024 12:00:00 AM

C
Job 61 Info System Security Analyst Principal II
  • CYBER CODE MASTERS LLC
  • Arlington, VA
  • Job Description Job Description This is an URGENT job posting. Responsibilities include: - Providing 24 x 7 watch suppor...
  • 6/7/2024 12:00:00 AM

C
Job 59 Info System Security Analyst Senior II
  • CYBER CODE MASTERS LLC
  • Arlington, VA
  • Benefits: 401(k) matching Health insurance This Urgent position requires shift work including nights/weekends Responsibi...
  • 6/7/2024 12:00:00 AM

C
Job 59 Info System Security Analyst Senior II
  • CYBER CODE MASTERS LLC
  • Arlington, VA
  • Job Description Job Description This Urgent position requires shift work including nights/weekends Responsibilities will...
  • 6/7/2024 12:00:00 AM

South Carolina (/ˌkærəˈlaɪnə/ (listen)) is a state in the Southeastern United States and the easternmost of the Deep South. It is bordered to the north by North Carolina, to the southeast by the Atlantic Ocean, and to the southwest by Georgia across the Savannah River. South Carolina became the eighth state to ratify the U.S. Constitution on May 23, 1788. South Carolina became the first state to vote in favor of secession from the Union on December 20, 1860. After the American Civil War, it was readmitted into the United States on June 25, 1868. South Carolina is the 40th most extensive and 23...
Source: Wikipedia (as of 04/11/2019). Read more from Wikipedia
Income Estimation for Systems/Application Security Analyst, Sr. jobs
$103,778 to $136,840