More jobs:
Cybersecurity Engineer; Identity and Access Management/Automation Req
Job in
Columbia, Lexington County, South Carolina, 29228, USA
Listed on 2026-02-16
Listing for:
MFM Jobs
Full Time
position Listed on 2026-02-16
Job specializations:
-
IT/Tech
Cybersecurity, Systems Engineer
Job Description & How to Apply Below
Location: Columbia
Founded in 2014,
MAC FACE began as a business development and marketing company and evolved in 2018 into a staffing corporation proudly serving both government and enterprise clients nationwide. Operating within the employment industry, we live by our motto, “Soaring Beyond the Limits,” delivering results with speed, precision, and professionalism. More than connecting candidates to opportunities, we provide lasting value and impact. As the industry evolves, we remain committed to innovation, integrity, and excellence
—powering people, driving business, and making a difference.
__________________________________________________________________________________________________
DailyDuties / Responsibilities:
The Cybersecurity Engineer will play a key role in strengthening the state’s information security posture through effective identity and access management, automation, and enterprise-level protection strategies. This role will focus on the
planning, development, implementation, and management
of integrated security solutions that protect state systems, data, and infrastructure.
Key Responsibilities:
- Lead
Identity and Access Management (IAM)initiatives to ensure proper implementation, configuration, and maintenance of
Single Sign-On (SSO),
Multi-Factor Authentication (MFA),
Active Directory
, and related enterprise applications. - Develop and implement
automation scripts and integrations
using tools such as
Python and Bash
to streamline and enhance enterprise security and IT operations. - Plan, design, and implement
enterprise security solutions
aligned with organizational goals, compliance requirements, and risk tolerance levels. - Design, deploy, and manage
countermeasures to known security threats
, and develop proactive strategies to mitigate emerging risks to enterprise data, networks, and associated services. - Validate and ensure
consistent application of security controls and protective measures
across enterprise systems, infrastructure, and business applications. - Collaborate with IT and security teams to monitor, analyze, and respond to security incidents and vulnerabilities.
- Support continuous improvement in
security automation, access control, and compliance validation
processes. - Provide technical input and recommendations for
security policies, standards, and best practices
that protect state data and technology services.
- Minimum
five (5) years of experience
with
Identity and Access Management (IAM), including access control, logging, and reporting systems. - Minimum
five (5) years of experience
in
automation development
using scripting tools such as
Python
and
Bash
. - Strong understanding of
cybersecurity principles, awareness, and risk management practices
. - Minimum
five (5) years of experience
with
Linux and Windows environments
, including network security protocols, authentication, and authorization mechanisms. - Minimum
five (5) years of experience
supporting
large-scale IT environments or enterprise system deployments
.
Skills:
- Experience with
Security Information and Event Management (SIEM)tools, including analysis and reporting. - Working knowledge of
security frameworks and compliance standards
, such as
NIST, CSF, CJIS, IRS 1075, and CMS MARS-E. - Experience in
Application Security (App Sec), including vulnerability scanning and secure coding practices.
Education / Certifications:
- Bachelor’s degree in
Information Technology, Information Security, Computer Science
, or a related field. - In lieu of a degree,
eight (8) years of relevant work experience
may be substituted.
Education / Certifications:
- Advanced security certifications such as
CISSP, CISA, or CISO
(or equivalent). - Additional relevant certifications, including
CEH, OSCP, or GPEN
. - Vendor-specific certifications in
SIEM, logging, or security technologies
.
- Initial Interview:Conducted via
Microsoft Teams (camera on). - Final Interview:
In-person
interviews preferred before final candidate selection. - Scheduling:Interviews will be scheduled
as soon as possible
after posting closure and review of submitted resumes.
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×