Job Title: Cyber Security Senior Analyst
Job Location: Columbia, SC, Partial Onsite (Tuesday Wednesday Thursday and as needed) is highly preferred.
Hours: M-F (8am-5pm is the standard)- The majority of work is done during regular business hours. Some testing may be required after hours and must be willing to work late if needed. This will be scheduled ahead of time by the assessment team.
Duration: 12 Months
C2 clearance eligibility is required
Job Summary:
Duties:
- Performs daily monitoring and review of security events that are escalated by junior analysts. Keeps up with the cyber threat landscape in order to rapidly identify potential threats. Performs security assessments such as penetration testing, vulnerability scanning and advanced threat hunting.
- 40% Plans and performs security assessments such as penetration testing, vulnerability scanning and advanced threat hunting. Anticipates and mitigates potential attacks through enterprise connections to ensure the security of the system (s). Exploits weaknesses detected in systems to assess and prevent potential break-ins. Analyzes business impact and exposure based on security threats, vulnerabilities, and risks. Keeps up with the cyber threat landscape in order to rapidly identify potential threats. Ensures security tools are properly tuned to identify and contain cyber-attacks before they happen.
- 20% Develops and implements enterprise information security architectures and solutions. Researches, designs, and advocates new technologies, infrastructure, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. Identifies, plans and implements security tools.
- 20% Performs daily monitoring and review of security events that are escalated by junior analysts. Provides security technical guidance to junior analysts. Performs investigations as needed and responses to potential incidents rapidly and accurately.
- 10% Researches new security/cyber intelligence and keeps up with the cyber threat landscape in order to rapidly identify potential threats. Ensures security tools are properly tuned to identify and contain cyber-attacks before they happen.
- 5% Evaluates and recommends procedures and processes for the prevention, detection, containment and correction of information security breaches. Advises management and users regarding security procedures.
- 5% Monitors security agencies and services in order to keep apprised of current security threats and concerns. Evaluates products and/or procedures to enhance productivity and effectiveness of information security across the organization.
Day to Day:
- A typical day in this role involves conducting deep-dive web application and API penetration tests, leveraging tools such as Burp Suite and custom scripts.
- Will work closely with application owners and dev teams, scheduling and leading engagements, gathering application details, define testing scope, and manage assessment timelines.
- The tester will review application architecture, identify vulnerabilities via manual and automated techniques, and document technical findings with clear remediation guidance.
- Time will also be spent validating previously reported issues, refining testing methodologies aligned to OWASP and industry standards, and collaborating with developers or stakeholders to walk through security concerns.
- They may also be involved in tuning testing platforms and integrating security checks into development pipelines where applicable.
- The role also involves contributing to any necessary internal and reporting documentation.
The Team: Cyber Threat Intelligence Team (CTI Team)
Required Skills and Abilities:
- Strong analytical, data gathering and problem solving skills with experience analyzing network attacks. Understanding of system and network security, incident management, intrusion detection, log analysis, and related technologies.
- Creativity to recognize and address new threats and security challenges as they arise. Strong knowledge of enterprise data architecture, systems engineering and data communications as applied to the automated storage and retrieval of information, using multiple platforms and protocols with the inherent security risks of each.
- Ability to effectively prioritize and execute tasks in a high-pressure environment. Comprehensive understanding of the organization's goals and objectives.
- Expertise with threat analysis risk management, configuration management, business continuity and contingency planning. Advanced knowledge of administrative, procedural and technical controls used to reduce security risks.
- Ability to troubleshoot multi-vendor Security issues. Strong organizational, interpersonal and oral communication skills. Advanced proficiency in network troubleshooting, diagnostic root cause analysis.
- Excellent analytical and problem-solving abilities.
Job Requirements:
Required Experience: 8 years of job related technical experience.
Preferred Work Experience: Strong incident response experience in a medium to large sized enterprise. Experience interpreting and acting on cyber threat intelligence.
Education: Required Education: Bachelor's degree in Computer Science, Information Technology or other job related degree. or 4 years of job related work experience or 2 years of job related experience plus an associate's degree in Computer Science, Information Technology or other job related degree.
Required Technologies:
- Burp Suite Professional - for web application interception, manipulation, and automated scanning.
- OWASP Top 10 knowledge and exploitation techniques - including injection, XSS, IDOR, and authentication flaws.
- API Security Testing - strong understanding and experience testing APIs using tools such as Postman, Swagger UI, ReadAPI, including RESTful and GraphQL endpoints.
- Experience with SAST and DAST tools - demonstrate hands-on experience using SAST and DAST tools
Nice To Have:
- Experience testing modern client-side frameworks like React, Angular, or Vue.js.
- Cloud platform security testing (AWS, Azure) including IAM misconfigurations and serverless apps.
- Familiarity with CI/CD pipeline security and DevSecOps integration.
Required Software and Other Tools:
- Advanced proficiency with applicable IT Security tools (software and hardware)
- Microsoft Office
Work Environment: Fast paced, multi-platformed environment which may require action and response 24X7 to support the technical business needs of the customer.
Soft Skills:
1) Clear communication - to effectively explain technical issues to both developers and non-technical stakeholders.
2) Leadership and initiative - the candidate will help shape and scale the program and must confidently lead efforts.
3) Adaptability - essential when navigating diverse application stacks and shifting project priorities.
4) Collaboration - ability to work with various teams across development, security, and management.
5) Documentation and reporting - must produce concise, accurate, and actionable findings that support remediation.
|