Job Responsibilities
General Responsibility
Perform real-time event analysis as a member of the South Carolina Critical Infrastructure Cybersecurity (SC CIC) Security Operations Center (SOC). Monitor relevant information feeds to ensure accurate and prompt incident notification. Perform strategic cyber threat intelligence research with the goal of real-world application. Recommend risk mitigation controls and procedures based on vulnerability, risk, and security assessment reports.
Specific Duties
- Perform duties as a SOC analyst including monitoring, investigation, incident handling, and entity coordination using established operational procedures. Work with other SOC analysts to deliver SC CIC services. Maintain communication and professional rapport with participants throughout investigations. Leverage real-world observations to improve services and identify useful emerging technologies.
- Provide support to primary incident responders and ensure all events are addressed with an appropriate resolution. Identify potential incidents and communicate with participants to initiate incident response. Thoroughly document all analysis, communication, and resolution.
- Contribute to strategic cyber threat intelligence for the SOC and program participants. Utilize resources to stay up to date on threat actor Tactics, Techniques, and Procedures (TTPs) and distill technical information for rapid consumption. Develop and promote standard operating procedures. Collaborate with other SOC personnel in identifying service delivery and process improvements.
- Leverage vulnerability scanning tools and reports to make recommendations for improving participants’ external security posture.
- Assist with hosting and participating in trainings, webinars, readiness, and tabletop exercises.
- Other related duties.
Minimum And Additional Requirements
- A bachelor's degree in information technology systems, cybersecurity risk management, or related field and experience in information security or related area. Relevant experience may be substituted for bachelor's degree on a year-for-year basis.
- Strong analytical skills with the ability to understand and relay basic cybersecurity best practices.
- Excellent communication skills, both written and oral, are essential.
- Ability to establish strong, positive working relationships with government and private officials is essential.
- Ability to identify and describe problems as well as coordinate resolution with various organizational elements.
- Ability to provide technical analyses of cybersecurity infrastructure vulnerabilities.
- Ability to provide counsel for the handling of classified, law enforcement sensitive, and industry proprietary information.
- Ability to provide technical guidance on complex projects.
- Involves working with sensitive information concerning critical infrastructure organizations around the state.
- Must be available 24 /7 for emergency incident response.
Preferred Qualifications
At least four (4) years of hands-on information security experience preferred.
Additional Comments
South Carolina Law Enforcement Division (SLED) is committed to providing equal employment opportunities to all applicants and does not discriminate on the basis of race, color, religion, sex (including pregnancy, childbirth, or related medical conditions, including, but not limited, to lactation), national origin, age (40 or older), disability or genetic information.
SLED offers an exceptional benefits package for FTE positions that includes:
- Health, Dental, Vision, Long Term Disability, and Life Insurance for Employee, Spouse, and Children
- 15 days annual (vacation) leave per year
- 15 days sick leave per year
- 13 paid holidays
- State Retirement Plan and Deferred Compensation Programs
Supplemental questions are considered part of the official application. Any misrepresentation of yourself may be grounds for disqualification.
Conditional selection based on candidate education, training, experience, oral interviews and clearance of background investigation.