More jobs:
LU - Security Analyst
Job in
Columbia, Richland County, South Carolina, 29228, USA
Listed on 2026-01-12
Listing for:
Focused HR Solutions
Full Time
position Listed on 2026-01-12
Job specializations:
-
IT/Tech
Cybersecurity, Information Security
Job Description & How to Apply Below
Join to apply for the LU - Security Analyst 1.19 role at Focused HR Solutions
1 year ago Be among the first 25 applicants
Join to apply for the LU - Security Analyst 1.19 role at Focused HR Solutions
Get AI-powered advice on this job and more exclusive features.
This range is provided by Focused HR Solutions. Your actual pay will be based on your skills and experience — talk with your recruiter to learn more.
Base pay range$65.00/hr - $80.00/hr
This position is 100% on-site remote work is not available. Our direct client has an opening for a Security Analyst rec 10902-1
This position is up to 12 months, with the option of extension, and is in Columbia, SC, W2 only. Corp to Corps are NOT allowed for this client.
Daily Duties / Responsibilities
- The Security Analyst is primarily responsible for assessing and evaluating the organization’s information & cyber security solutions and processes, as well as providing technical advisory to influence the design and implementation of security information technology systems and networks.
- The Security Analyst will guide junior analyst (Security Analyst I and II) to identify and address risks, and lead the response to information security issues.
- Candidates should be self-starters, creative problem solvers and have an eagerness to implement tactics, techniques and procedures that make the most effective use of Agency staff, resources, products and technologies quickly.
- Understanding of information technology and security concepts.
- Experience or knowledge of operating systems (e.g., Android, iOS, Linux, Windows, MVS, VMWare), cloud computing, networks, hardware and software platforms, and protocols as they relate to information security.
- Experience or knowledge in performing vulnerability assessments, including scanning, analysis of results, and manual validation.
- Experience with secure networking technologies such as network firewalls and IDS/IPS technologies, Network Security Monitoring expertise, and Security Information and Event Management (SIEM) systems.
- Experience in information security incident response and risk management.
- Experience managing and responding to information security risks, threats and incidents.
- Threat and vulnerability management; awareness of current threats to confidentiality, integrity, and availability of data and controls to mitigate threats.
- Strong working knowledge of applicable internal and/or external regulatory policies, standards, procedures and controls (e.g., Centers for Medicaid and Medicare (CMS) MARS-E 2.0, National Institute of Standards and Technology (NIST), Control Objectives for Information and Related Technology (COBIT), and Federal Risk and Authorization Management Program (FedRAMP).
- Experience or knowledge with the development and integration of RMF tasks and artifacts into the System Development Life Cycle (SDLC) is ideal.
- Experience or knowledge in security as related to multi-tenant, cloud services and vendor interface management would be considered desirable for this position.
- Working knowledge of TCP/IP and the functioning of its component protocols, ability to read, and analyze, using various toolsets such as tcpdump, wireshark, etc; how they work and what information they produce will be beneficial in this role.
- Understanding basic defense-in-depth principles such as and secure system configuration, network segmentation and malicious code protection is a plus.
- Experience working in a SOC environment is preferred.
- Experience in operating and contributing to a security operations center responding to alerts and anomalies, creating and interpreting dashboards and triaging cross-functional teams is preferred.
- Hands-on experience in the secure implementation, operation and on-going maintenance of computer systems, software, hardware and networks is preferred.
- Assist in the day-to-day duties of SOC monitoring activities, tools and processes
- Provide hands-on support for OCS security tools
- Conduct threat hunts (specialized searches) for evidence of compromise
- Monitor security technologies for alerts
- Investigating incidents, gathering evidence,…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×