Overview
Remote
On Site
Hybrid
BASED ON EXPERIENCE
Contract - W2
Skills
CYBER SECURITY
THREAT INTELLIGENCE
BURP SUITE
OWASP
Job Details
DPP is seeking a Senior Cyber Security Analyst for an opportunity in Columbia, SC. Candidates must be eligible to earn a low-level US security clearance (public trust).
Work arrangement:
Click the apply button or contact our recruiter Kenny at to learn more about this position (#25-00439).
Work arrangement:
- Partial onsite: TWTh and as needed (PREFERRED)
- W2 position; 12 months
- Must be eligible to earn a low-level US security clearance, which requires a thorough background search and ship.
- A typical day as a Senior Cyber Security Analyst involves conducting deep-dive web application and API penetration tests, leveraging tools such as Burp Suite and custom scripts.
- You will work closely with application owners and dev teams, scheduling and leading engagements, gathering application details, defining testing scope, and managing assessment timelines. The tester will review application architecture, identify vulnerabilities via manual and automated techniques, and document technical findings with clear remediation guidance.
- Time will also be spent validating previously reported issues, refining testing methodologies aligned to OWASP and industry standards, and collaborating with developers or stakeholders to walk through security concerns.
- You may also be involved in tuning testing platforms and integrating security checks into development pipelines where applicable. The role also involves contributing to any necessary internal and reporting documentation.
- Burp Suite Professional - for web application interception, manipulation, and automated scanning.
- OWASP Top 10 knowledge and exploitation techniques - including injection, XSS, IDOR, and authentication flaws.
- API Security Testing - strong understanding and experience testing APIs using tools such as Postman, Swagger UI, ReadAPI, including RESTful and GraphQL endpoints.
- Experience with SAST and DAST tools - demonstrate hands-on experience using SAST and DAST tools
- CISA, CISM, CISSP
- Experience testing modern client-side frameworks like React, Angular, or Vue.js.
- Cloud platform security testing (AWS, Azure), including IAM misconfigurations and serverless apps.
- Familiarity with CI/CD pipeline security and DevSecOps integration.
- Clear communication - to effectively explain technical issues to both developers and non-technical stakeholders.
- Leadership and initiative - the candidate will help shape and scale the program and must confidently lead efforts.
- Adaptability - essential when navigating diverse application stacks and shifting project priorities.
- Collaboration - ability to work with various teams across development, security, and management.
- Documentation and reporting - must produce concise, accurate, and actionable findings that support remediation.
- 8 years of job-related technical experience.
- Preferred: Strong incident response experience in a medium to large sized enterprise. Experience interpreting and acting on cyber threat intelligence.
- Bachelor s degree in Computer Science, Information Technology, or other job-related degree;
- OR, Associates degree in CS, IT, or other job-related degree plus 2 years of work-related experience;
- OR, 4 years job-related work experience (total 12 years without a degree)
- The Cyber Threat Intelligence (CTI) team has members that work 8-hour days between 7am and 7pm (8-5 is the standard but flexibility is available).
- The schedule will be agreed upon between the employee and management. The majority of work is done during regular business hours. Some testing may be required after hours and must be willing to work late if needed. This will be scheduled ahead of time by the assessment team.
- Performs daily monitoring and review of security events that are escalated by junior analysts. Keeps up with the cyber threat landscape in order to rapidly identify potential threats. Performs security assessments such as penetration testing, vulnerability scanning and advanced threat hunting.
- Plans and performs security assessments such as penetration testing, vulnerability scanning and advanced threat hunting. Anticipates and mitigates potential attacks through enterprise connections to ensure the security of the system (s). Exploits weaknesses detected in systems to assess and prevent potential break-ins. Analyzes business impact and exposure based on security threats, vulnerabilities, and risks. Keeps up with the cyber threat landscape in order to rapidly identify potential threats. Ensures security tools are properly tuned to identify and contain cyber-attacks before they happen.
- Develops and implements enterprise information security architectures and solutions. Researches, designs, and advocates new technologies, infrastructure, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. Identifies, plans and implements security tools.
- Performs daily monitoring and review of security events that are escalated by junior analysts. Provides security technical guidance to junior analysts. Performs investigations as needed and responses to potential incidents rapidly and accurately.
- Researches new security/cyber intelligence and keeps up with the cyber threat landscape in order to rapidly identify potential threats. Ensures security tools are properly tuned to identify and contain cyber-attacks before they happen.
- Evaluates and recommends procedures and processes for the prevention, detection, containment and correction of information security breaches. Advises management and users regarding security procedures.
- Monitors security agencies and services in order to keep apprised of current security threats and concerns. Evaluates products and/or procedures to enhance productivity and effectiveness of information security across the organization.
- Strong analytical, data gathering and problem-solving skills with experience analyzing network attacks. Understanding of system and network security, incident management, intrusion detection, log analysis, and related technologies.
- Creativity to recognize and address new threats and security challenges as they arise.
- Strong knowledge of enterprise data architecture, systems engineering and data communications as applied to the automated storage and retrieval of information, using multiple platforms and protocols with the inherent security risks of each.
- Ability to effectively prioritize and execute tasks in a high-pressure environment.
- Comprehensive understanding of the organization s goals and objectives.
- Expertise with threat analysis risk management, configuration management, business continuity and contingency planning. Advanced knowledge of administrative, procedural and technical controls used to reduce security risks.
- Ability to troubleshoot multi-vendor Security issues.
- Strong organizational, interpersonal and oral communication skills. Advanced proficiency in network troubleshooting, diagnostic root cause analysis.
- Excellent analytical and problem-solving abilities.
- Advanced proficiency with applicable IT Security tools (software and hardware).
- Microsoft Office.
Click the apply button or contact our recruiter Kenny at to learn more about this position (#25-00439).
: This role requires the ability to obtain a low-level US security clearance, which requires a thorough background search and ship. Residency requirements may apply. EOE/AA/V/D
DPP offers a range of compensation and benefits packages to our employees and their eligible dependents. Call today to learn more about working with DPP.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.