Security Analyst Project Lead (MITRE ATT&CK) (Hybrid)

Hybrid in Columbia, SC, US • Posted 9 hours ago • Updated 9 hours ago
Contract W2
Contract Independent
Contract Corp To Corp
50% Travel Required
Hybrid
$60 - $70/hr
Fitment

Dice Job Match Score™

📊 Calculating match score...

Job Details

Skills

  • Security
  • Monitoring
  • Incident Response
  • Mitre ATT&CK
  • VPN
  • Active directory
  • Firewall
  • Linux

Summary

Client: State of SC
Posting ID: 10792
Posting title: IT - ADMIN - Security Analyst - Project Lead
Division: Division of Technology - Information Security (DIS)
Title: Security Analyst - Project Lead
Address: 4430 Broad River Road, Columbia SC 29212
Projected Start Date: 05/25/2026
Projected End Date/Duration: 12 Months from projected start
Interview Process: 1 Round of Virtual/Online Interviews - potential for second round of in-person interviews
Duration of the Contract: 12 Months
Possibility for Extension: Yes
Work Location: Role is 100% Remote
Candidate location: No SC residency required. Open to nationwide candidates.
Additional Information: Preference will be given to candidates that are local to SC and are able to come onsite for project needs.

The following are required for bid submission:

  • Resume
  • R2R
  • Cover Letter
  • Meets Work Location

Required Skills

  • 2+ Years of Experience with Security Monitoring and Incident Response
  • 2+ Years of Experience with MITRE ATT&CK framework.
  • 2+ Years of Experience with dashboard creation and reporting

Preferred Skills

  • Experience with the Palo Alto Cortex XSIAM/XDR platform.
  • Knowledge of Linux network administration and network design.
  • Experience in administration of firewalls, VPN technology, Active Directory, Intrusion Detection/Prevention systems.
  • Candidate is local to Columbia, SC or surrounding city in South Carolina

Description

Why is this position open (new role, increased workload, new dept, resignation, promotion)?

  • If backfill Position – What separated the candidate, you initially selected from all the other resumes presented?
  • New role supporting statewide security incident response.

Scope of the project:

  • The position will work as an Tier 2 SOC Analyst for the Division of Information Security. This role will focus on supporting security monitoring, threat detection, security incident response and security investigations. Engaging directly with state agencies to promote, support, and improve adoption of centralized security services is a key focus. The engagement is expected to be needed for 12 months with the possibility of extension.

Daily Duties / Responsibilities:

  • PREFERENCE WILL BE GIVEN TO A CANDIDATE WHO CAN WORK ONSITE OVER HYBRID AND OVER FULL-TIME REMOTE (ON-SITE AS NEEDED).
  • Continuously review and correlate security event data across SIEM, EDR, IDS/IPS, and threat intelligence sources to identify complex attack patterns, emerging threats, and security incidents.
  • Perform deep-dive analysis of suspicious activity, validate incidents, determine root cause and impact, and escalate critical incidents with detailed context to Tier 3 as required.
  • Create detailed incident reports, timelines, and post-incident summaries; contribute to lessons-learned documentation and recommendations for remediation and preventative measures.
  • Investigate user-reported phishing, malware infections, and potential policy violations; advise users and internal/external teams on containment and recovery actions.
  • Recommend updates to SOC playbooks and workflows based on real-world INVESTIGATIONS, fine-tune detection rules. Alert thresholds, and correlation logic to reduce false positives and improve threat coverage.
  • Collaborate with engineering teams to ensure monitoring tools are properly configured and tuned. Integrate new threat intelligence feeds into workflows and proactively hunt for threats using up-to date tactics, techniques, and procedures (TTPs)
  • Serve as a customer-facing SME, “selling” the value of DIS services by demonstrating
  • capabilities and resolving issues.
  • Document processes, runbooks, and troubleshooting steps related to SOC operations.
  • Coordinate with engineering, SOC, and agency staff as needed to meet goals.
  • Other duties as needed.

Required Education/Certifications:

  • Associate’s degree in an information technology or information security related field
  • Four years of relevant work experience may be substituted in lieu of education
  • Two years of experience in supporting large soc operations.

Preferred Education/Certifications:

  • CISSP, CISA, CISO or equivalent advanced security certification.
  • Additional relevant certifications (e.g., CEH, OSCP, GPEN).
  • Vendor certifications related to information security.

Interview Process (phone, video or in-person, how many rounds of i/v’s, etc)?

  • Initial round of interviews on Microsoft Teams (on camera) with in-person interviews Preferred before final selection

Interview Availability: How soon can you schedule an interview (date / times)?

  • ASAP after posting closes and resumes are received and reviewed

“Cleo Consulting is an equal opportunity employer (Minorities/Women/Veterans/Disabled)”

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
  • Dice Id: 91081631
  • Position Id: 7119-22658-
  • Posted 9 hours ago
Create job alert
Set job alertNever miss an opportunity! Create an alert based on the job you applied for.

Similar Jobs

Columbia, South Carolina

4d ago

Easy Apply

Contract, Third Party

Depends on Experience

Remote or Columbia, South Carolina

Today

Easy Apply

Contract, Third Party

Remote or Columbia, South Carolina

5d ago

Easy Apply

Contract

Remote or Columbia, South Carolina

Today

Easy Apply

Contract, Third Party

$$80/hr on W2

Search all similar jobs