Associate Computer Security Engineer - Cyber Monitoring
Job
OUTSOURCE Consulting Services, Inc.
Aiken, SC (In Person)
Full-Time
Review key factors to help you decide if the role fits your goals.
Pay Growth
?
out of 5
Not enough data
Not enough info to score pay or growth
Job Security
?
out of 5
Not enough data
Calculating job security score...
Total Score
77
out of 100
Average of individual scores
Skill Insights
Compare your current skills to what this opportunity needs—we'll show you what you already have and what could strengthen your application.
Job Description
Seeking a motivated and detail-oriented Associate Computer Security Engineer - Cyber Monitoring to support our federal government clients network monitoring team in Aiken, SC .
Application Deadline:
Thursday, 05/28/2026 at 5:00PM EDT Requirements:
This position is ideal for candidates with foundational knowledge in cyber security who are ready to further develop their skills in a dynamic, mission-focused environment. The role is designed for individuals at the entry level. Onsite with limited telework from your primary residence ( 25%-100% onsite). The Contractor will work closely with experienced cybersecurity staff and receive training in cybersecurity policies, best practices, and real-world defensive strategies. This collaborative environment will help the candidate build a strong foundation in both technical and procedural aspects of cybersecurity, while contributing to the protection of critical infrastructure. a { text-decoration: none; color: rgb(70,79,235); } tr th, tr td { border: 1.0px solid rgb(230,230,230); } tr th { background-color: rgb(245,245,245); } Under regular supervision will assists with the investigation, design, and development of software and/or hardware security. a { text-decoration: none; color: rgb(70,79,235); } tr th, tr td { border: 1.0px solid rgb(230,230,230); } tr th { background-color: rgb(245,245,245); } Support the security of SRS resources through designing/implementing/evaluating measures tied to theNIST Core Cyber Framework:
Identify, Detect, Respond and Recover Safety is a primary responsibility in each job performed Obtain safety training, obey safety rules and make safety an integral part of each task Take the necessary steps to stop work if continuing the job is unsafe or will create an unsafe condition Under regular supervision, assists with the investigation, design, and development of software and/or hardware security technologies for SRS Work with vendors to develop technical solutions for site computer security needs Maintain the integrity of computer workstations, servers, and networks by maintaining access controls and software lifecycle process as needed Ensure data integrity and confidentiality through implementing the use of both encryption and data retention technologies Increase technical abilities through specialized vendor training, manuals and technical journals, software seminars, informational meetings, and practical experience Ensure that site/company policies and procedures are tied to customer requirements and our evaluated for effectiveness and proper implementationAdditional Duties:
Review external indicators of compromise and evaluate them for impact both of potential related traffic and for the effect of adding restrictions based on them Preform review of both quarantined and end user reported emails for evidence of malicious intent Perform administration of logging and other security tooling both at the deployment level and policy configuration Collaborate with team members and management to strengthen the organization's security posture Monitor network security alerts and assist in responding to potential threats in real time Review and analyze emails for suspected phishing and other malicious activity Ingest and apply threat intelligence to enhance organizational defenses Perform log review and alert management to identify and escalate security incidents Maintain and support cyber security toolsets and ensure their effective operation Assist in the development and implementation of basic security policies and proceduresWork Hours:
A 40 hour work week is scheduled. The client utilizes various work schedules including 5/8s (8 hour/day; five days per week), 4/10's (10 hours/day; four days per week), and 9/80's (9 hours/day, five days on week AA and four days on week BB. Work week excludes the client's holidays. Each workday has 30-minute lunch. Overtime will be expected at times to meet deliverables and will be utilized at the discretion of the Manager. The Anticipated Work Schedule is from Mon-Thurs 6:30am-5:00pm.Area Security Access:
Candidate must be able to obtain and maintain a DOE "Q" security clearance.Qualifications:
Required:
Must be able to participate in group problem solving including communicating effectively with both technical and nontechnical personnel, respect the ideas of others and accept the judgment of the group Must be familiar with available resource materials and be able to conduct timely research Must have a sense of when to ask for help and be comfortable in accepting guidance from other more senior technical personnel Excellent written and verbal communication abilities Knowledge of basic cybersecurity principles, protections, or frameworks (e.g., NIST) Demonstrated willingness to learn new technologies, frameworks, and regulatory environments Ability to work on-site with limited teleworking options Foundational knowledge of log review, alert management, and email security practices Strong analytical and problem-solving skills Attention to detail and a commitment to maintaining high standards of security Able to obtain and maintain a DOE "Q" security clearanceEducation:
Bachelor's degree in any field (degree does not need to be in cybersecurity although a degree related to Information Technology is preferred). Bachelor degree in an IT related discipline (e.g., Information Technology, Computer Technology. Software Engineering, Computer Science, Computer Engineering); or Non-related Bachelor degree with 2 years proven performance in related assignment(s); or Associate Degree in IT related discipline (e.g. Information Technology, Computer Technology, Software Engineering, Computer Science, Computer Engineering) with 2 years proven performance in related assignment(s); or Non-related Associate Degree with 4 years proven performance in related assignment(s). In lieu of degree, a high school diploma with at least 6 years of equivalent knowledge and experience is acceptable. Knowledge of computer and network digital systems used in business or process applications. Detailed knowledge in specific operating systems is desirable.NOTE:
US Citizenship is required to perform this government contract.Additional Information:
OUTSOURCE
Consulting Services, Inc. (OCSI.co) is an Equal Opportunity Employer. We welcome applicants of all backgrounds and take affirmative action to employ and advance qualified individuals with disabilities and protected veterans, in compliance with Section 503 of the Rehabilitation Act and VEVRAA. OCSI.co participates in E-Verify. Learn more about applicant rights under Federal Employment Laws. OCSI.co provides great benefits to our federal contractors: Holidays, PTO, Healthcare, Dental, Vision, Short- and Long-Term Disability, Life Insurance, Flexible Spending Account (FSA), 401(k) Savings Plan, Roth Elective Deferral, and Direct Deposit. To learn more about OCSI.co, please visit our corporate website at www.ocsi.co . Thank you for your interest in our jobs. We look forward to seeing your resume!Note:
We are unable to sponsor H1B Visa's and/or subcontract to Third Party Vendors. Need Assistance? If you need a reasonable accommodation to apply for a position at OCSI.co, please email Human Resources with your request and contact information.Similar jobs in Aiken, SC
UDR Consulting Inc
Aiken, SC
Posted2 days ago
Updated2 hours ago
Similar jobs in South Carolina
The Coca-Cola Company
Marion, SC
Posted1 day ago
Updated2 hours ago