Associate Computer Security Engineer - Cyber Monitoring

OUTSOURCE Consulting Services, Inc.Aiken, SC
Onsite

About The Position

Seeking an Associate Computer Security Engineer to support our federal government client in Aiken, SC. The Contractor will assist with the investigation, design, development, and support of software and/or hardware security technologies in support of the client’s operations, under regular supervision. This role involves supporting the security of the client’s resources through implementation and evaluation of cybersecurity controls aligned to the NIST Core Cybersecurity Framework (Identify, Detect, Respond, and Recover). Responsibilities include maintaining the integrity of computer workstations, servers, and networks, ensuring data integrity and confidentiality, working with vendors on technical security solutions, and participating in basic cyber monitoring activities.

Requirements

  • Ability to communicate effectively with technical and non‑technical personnel
  • Strong analytical, problem‑solving, and attention‑to‑detail skills
  • Foundational knowledge of cybersecurity principles, protections, or frameworks (e.g., NIST)
  • Familiarity with log review, alert management, and email security practices
  • Ability to conduct independent research and utilize technical resource materials
  • Willingness to learn new technologies, frameworks, and regulatory environments
  • Ability to work on‑site with limited teleworking flexibility
  • Able to obtain and maintain a DOE “Q” security clearance
  • US Citizenship is required to perform this government contract.

Nice To Haves

  • Experience reviewing indicators of compromise and evaluating security impact
  • Experience monitoring network security alerts and responding to potential threats
  • Experience administering cybersecurity logging and monitoring tools
  • Experience supporting email security and phishing investigations
  • Experience assisting with the development and implementation of security policies and procedures
  • Knowledge of computer and network digital systems used in business or process applications
  • Detailed knowledge in specific operating systems is desirable

Responsibilities

  • Assist with the investigation, design, and development of computer, software, and/or hardware security solutions
  • Support the security of the client’s resources through implementation and evaluation of cybersecurity controls aligned to the NIST Core Cybersecurity Framework (Identify, Detect, Respond, and Recover)
  • Maintain the integrity of computer workstations, servers, and networks through access controls and software lifecycle processes
  • Ensure data integrity and confidentiality through encryption and data retention technologies
  • Work with vendors to develop and implement technical security solutions for the client
  • Participate in log review, alert management, email security review, and basic cyber monitoring activities
  • Review quarantined and end‑user reported emails for malicious intent
  • Maintain and support cybersecurity toolsets and logging infrastructure
  • Ensure site and company cybersecurity policies align with customer requirements and are evaluated for effectiveness
  • Increase technical proficiency through vendor training, manuals, seminars, and hands‑on experience
  • Participate in group problem‑solving efforts with both technical and non‑technical personnel
  • Follow all safety policies and procedures, making safety an integral part of each task and stopping work when unsafe conditions exist
  • Review external indicators of compromise and evaluate them for impact both of potential related traffic and for the effect of adding restrictions based on them
  • Perform administration of logging and other security tooling both at the deployment level and policy configuration
  • Collaborate with team members and management to strengthen the organization’s security posture
  • Monitor network security alerts and assist in responding to potential threats in real time
  • Review and analyze emails for suspected phishing and other malicious activity
  • Ingest and apply threat intelligence to enhance organizational defenses
  • Perform log review and alert management to identify and escalate security incidents
  • Maintain and support cyber security toolsets and ensure their effective operation
  • Assist in the development and implementation of basic security policies and procedures

Benefits

  • Holidays
  • PTO
  • Healthcare
  • Dental
  • Vision
  • Short/Long Term Disability
  • Life Insurance
  • Flexible Spending Account (FSA)
  • 401(k) Savings Plan
  • Roth Elective Deferral
  • Direct Deposit
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service