Home       |     Overview      |     Candidate Login      |     Post Resume       |     Contact us
 
  
     
     
Search Jobs
     
Keywords,Title,Skills,Company  Location,City,State,Zip  
  Advanced Search
     
Cybersecurity Windows Server Network Security Information Security Analyst
(Jobs
 
Requirement id 146688
Job title Analyst
Job location in Blythewood, SC
Skills required Cyber Security, IT Security, not found, Windows Server Network Security Informat
Open Date 05-Apr-2024
Close Date
Job type Contract
Duration 12 Months
Compensation DOE
Status requirement ---
Job interview type ---
   Email Recruiter: coolsoft
Job Description Analyst: Cyber Security, IT Security, not found, Windows Server Network Security Informat

start date :MAY 3RD 2024

submission deadline :4/12/2024

client info :Department of Motor Vehicles

Note:


* INTERVIEW PROCESS (WHO WILL CONDUCT I/V, PHONE OR IN-PERSON, HOW MANY ROUNDS OF I/VS)?

• Security Team Manager
• In-person preferred but will be willing to accommodate highly qualified candidates.
• 2 rounds of interviews possible

* SCHEDULE INTERVIEW: HOW SOON CAN YOU SCHEDULE AN INTERVIEW (DATE / TIMES)?

- ASAP



Description :

Enhance the security posture of the South Carolina Department of Motor Vehicles (SCDMV) to protect sensitive citizen data and ensure the integrity of motor vehicle licensing and titling systems.


DAILY DUTIES / RESPONSIBILITIES:
1. PRIORITIZE AND PATCH VULNERABILITIES: ANALYZE REPORTS, IDENTIFY CRITICAL SYSTEMS, RECOMMEND PATCHES BASED ON RISK AND BEST PRACTICES, AUTOMATE DEPLOYMENT USING SCCM, GPO, OR POWERSHELL.
2. HUNT FOR THREATS: LEVERAGE THREAT INTELLIGENCE FEEDS AND DEFENDER FOR ENDPOINT TO PROACTIVELY SEARCH FOR SUSPICIOUS ACTIVITY, INVESTIGATE POTENTIAL INDICATORS OF COMPROMISE, AND ESCALATE THREATS FOR INCIDENT RESPONSE.
3. STAY INFORMED ON THREATS: CONTINUOUSLY UPDATE YOUR KNOWLEDGE OF CYBER THREATS THROUGH INTELLIGENCE FEEDS AND REPORTS, IDENTIFY POTENTIAL ATTACK VECTORS RELEVANT TO YOUR ORGANIZATION.
4. EMPOWER EMPLOYEES: DEVELOP AND MAINTAIN SECURITY AWARENESS TRAINING, CONDUCT REGULAR TRAINING SESSIONS, SIMULATE PHISHING ATTACKS TO TEST AWARENESS, AND TRACK PARTICIPATION TO MEASURE PROGRAM EFFECTIVENESS.
5. OPTIMIZE DEFENDER FOR ENDPOINT: CONFIGURE POLICIES FOR OPTIMAL THREAT DETECTION AND PREVENTION, MONITOR ALERTS AND INVESTIGATE INCIDENTS, MANAGE ENDPOINT PROTECTION SETTINGS ACROSS DEVICES, GENERATE REPORTS TO IDENTIFY SECURITY WEAKNESSES.
6. REPORT SECURITY POSTURE: PROVIDE REGULAR REPORTS ON VULNERABILITY PATCHING, ONGOING THREAT HUNTS, AND SECURITY AWARENESS PROGRAM EFFECTIVENESS, INCLUDING KEY METRICS AND PROPOSED MITIGATION STRATEGIES FOR IDENTIFIED SECURITY GAPS.

REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):
• VULNERABILITY MANAGEMENT: ANALYZE REPORTS, PRIORITIZE PATCHING, UNDERSTAND NIST BEST PRACTICES.
• THREAT HUNTING & INTELLIGENCE: UTILIZE THREAT FEEDS, INVESTIGATE SUSPICIOUS ACTIVITY, STAY CURRENT ON CYBER THREATS.
• SECURITY AWARENESS TRAINING: DEVELOP & DELIVER TRAINING, ASSESS EMPLOYEE AWARENESS THROUGH SIMULATIONS.
• SECURITY AUTOMATION: LEVERAGE SCCM, GPO, POWERSHELL FOR PATCH DEPLOYMENT.
• ENDPOINT SECURITY (DEFENDER FOR ENDPOINT): CONFIGURE POLICIES, ANALYZE ALERTS, MANAGE ENDPOINT PROTECTION.
• INCIDENT RESPONSE: IDENTIFY AND ESCALATE POTENTIAL SECURITY THREATS.
• COMMUNICATION: DELIVER REPORTS ON SECURITY POSTURE AND PROPOSE MITIGATION STRATEGIES.
• PROBLEM-SOLVING: ANALYZE DATA, IDENTIFY ANOMALIES, AND RECOMMEND SOLUTIONS.
• ATTENTION TO DETAIL: ENSURE ACCURATE ANALYSIS AND CONFIGURATION FOR EFFECTIVE SECURITY MEASURES.

PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
• SCRIPTING: AUTOMATE TASKS BEYOND SCCM, GPO, AND POWERSHELL FOR INCREASED EFFICIENCY.
• DIGITAL FORENSICS: INVESTIGATE SECURITY INCIDENTS AND COLLECT EVIDENCE FOR DEEPER ANALYSIS.
• NETWORK SECURITY: UNDERSTAND NETWORK PROTOCOLS AND FIREWALLS TO STRENGTHEN OVERALL SECURITY POSTURE.
• CLOUD SECURITY: AS CLOUD ADOPTION GROWS, UNDERSTANDING CLOUD-SPECIFIC SECURITY SOLUTIONS BECOMES VALUABLE.

REQUIRED EDUCATION: A bachelors degree in information technology systems, computer science, cybersecurity, or a related field with 3+ years experience in a security focused role. Relevant experience may be substituted for the degree on a year-for-year basis

REQUIRED CERTIFICATIONS: Not required, however we prioritize applicants who have:
• Certified Incident Handler (GCIH)
 
Call 502-379-4456 Ext 100 for more details. Please provide Requirement id: 146688 while calling.
 
Other jobs in SC: Beaufort (1), Blythewod (2), Blythewood (3), Charleston (17), Columbia (37), Greenville (4), Hartsville (2), North Charleston (2), Overland Park (1), San Francisco (1), SENECA (4), South Carolina (1), Spartanburg (3), Unknown (2),
 
 Cyber Security job openings in other states
Jobs List

Idaho - AOC - Cybersecurity Program Manager (748936)
Create date: 18-Oct-2024
Hybrid

No of Submissions : 2

start date : 10/15/2024

End date : 04/15/2025

submission deadline : 10/24/2024

client info : Idaho Judicial Branch - Administrative Office of the Courts - IT

Note:

* Agency Interview Type: In Person
.... (This job is for - Cybersecurity Jobs in ID Boise Manager - (in Boise, ID))

Assessment Tools Based Program Interventions - 25-012 - NSPO
Create date: 18-Sep-2024
Bid URL: https://www.publicpurchase.com/gems/bid/bidView?bidId=192267&

Note: Email Submission

Submission Deadline: 10/11/2024 11:00 AM
Start Date: 10/28/2024
End Date: 10/28/2025

Client: County of Fresno

Description:

The County of Fresno Probation Department (Probation) is requesting .... (This job is for - Cybersecurity Jobs in CA Clovis Consultant - (in CLOVIS, CA))

IT Security Architect 2 -133863
Create date: 15-Aug-2024
No of Submissions : 1

start date : 09/09/2024

End date : 1 Years from projected start date

submission deadline : 8/21 at 10am EST

client info : MSP

Note:

* Interview Process: Interviews will be held in person. Candidates must be available for an in-person interview.

* D.... (This job is for - Cybersecurity NIST SaaS Jobs in MI Dimondale Architect - (in Dimondale, MI))

Cybersecurity Analyst -133730
Create date: 07-Aug-2024
No of Submissions : 1

Start date : 6/17/2024

End Date : 6/15/2025

Submission deadline : 8/14/2024 3:00:00 PM

Client Info : MS Dept of Human Services

Note:

* No max BR

* Onsite required

* Do not submit remote candidates, MDHS will reject the candidate if they in.... (This job is for - Cybersecurity Tenable Jobs in MS Jackson Analyst - (in Jackson, MS))

Information Technology Security Officer - 132261
Create date: 09-Jul-2024
No of Submissions : 1

Start date : 7/22/2024

End Date : 6/30/2025

Submission deadline : 7/16/2024 3:00:00 PM

Client Info : MS State Dept of Health

Note:

* Onsite in MS a minimum of 1 week per month plus during an emergency defined by the State Health Office or as negotiated between t.... (This job is for - CybersecurityCISM Jobs in MS Jackson Consultant - (in Jackson, MS))
 
 Cyber Security job openings in SC
Jobs List

SECURITY ANALYST-CONSULTANT-11299-1
Create date: 22-Jul-2024
Position Title : SECURITY ANALYST – CONSULTANT (INFO SYS SECURITY OFFICER – ISSO)

No of Submissions : 2

Start date : AUG 13, 2024

Submission deadline : 7/31/2024

Client Info : Department of Health and Human Services

Note:

Q) INTERVIEW PROCESS (phone, video or in-person, how many roun.... (This job is for - Cybersecurity FISMA Hipaa Jobs in SC Columbia Consultant - (in Columbia, SC))

SECURITY ANALYST -CONSULTANT -11267-1
Create date: 03-Jul-2024
Job Title: SECURITY ANALYST – CONSULTANT (INFO SYS SECURITY OFFICER – ISSO)-11267-1

No of Submissions : 2

start date :7/27/2024

submission deadline : 7/11/2024

client info : Department of Health and Human Services

Note:

***Desired max bill rate $117.04***

* Bill Rate: $1.... (This job is for - Cybersecurity FISMA Jobs in SC Columbia Analyst - (in Columbia, SC))

SECURITY ANALYST (CONSULTANT) - 10902-1
Create date: 02-Aug-2023
start date : SEPTEMBER 12, 2023

End date : 12 MONTHS from the start date.

submission deadline : 8/9/2023

client info : Department of Health and Human Services

Note :

* INTERVIEW PROCESS (phone, video or in-person, how many rounds of i/vs, etc)?

- In-person or video for initial inter.... (This job is for - Cybersecurity Jobs in SC Columbia Analyst - (in Columbia, SC))

IT Security Analyst - 10828-1
Create date: 16-May-2023
Start date :June 15 2023
End Date :6 months

Submission deadline :5/23/2023

Client Info :Clemson University

Note:
* INTERVIEW PROCESS (who will conduct i/v, phone or in-person, how many
rounds of i/vs)?

2 Rounds of interviews.

1 Phone and 1 in-person


Descript.... (This job is for - Cybersecurity Jobs in SC CLEMSON Analyst - (in CLEMSON, SC))

SECURITY ANALYST (INTERMEDIATE) - 10570-1
Create date: 23-Sep-2022
start date:10/25/2022
End date:12 MONTHS

submission deadline:9/30/2022

client info : Department of Health and Human Services

Note:

* INTERVIEW PROCESS (phone, video or in-person, how many rounds of i/vs, etc)?

* In-person or video for initial interview. Phone may be used for secondary in.... (This job is for - Cybersecurity Jobs in SC Columbia Analyst - (in Columbia, SC))
(Analyst: Cyber Security, IT Security, not found, Windows Server Network Security Informat in Blythewood, SC)
     
Search Jobs
     
Keywords,Title,Skills,Company  Location,City,State,Zip  
  Advanced Search
     

    About Us     Services    Privacy policy    Legal     Contact us