Associate Computer Security Engineer-Cyber Monitoring

UDR Consulting IncAiken, SC
Hybrid

About The Position

UDR is seeking qualified candidates for an Associate Computer Security Engineer- Cyber Monitoring opportunity for our customer in Aiken, SC to support the Savannah River Site. This position is ideal for candidates with foundational knowledge in cyber security who are ready to further develop their skills in a dynamic, mission-focused environment. The role is designed for individuals at the entry level. Onsite with limited telework from your primary residence. The successful candidate will work closely with experienced cybersecurity staff and receive training in cybersecurity policies, best practices, and real-world defensive strategies. This collaborative environment will help the candidate build a strong foundation in both technical and procedural aspects of cybersecurity, while contributing to the protection of critical infrastructure.

Requirements

  • Bachelor degree in an IT related discipline (e.g., Information Technology, Computer Technology, Software Engineering, Computer Science, Computer Engineering); or Non-related Bachelor degree with 2 years proven performance in related assignment(s); or Associate Degree in IT related discipline (e.g. Information Technology, Computer Technology, Software Engineering, Computer Science, Computer Engineering) with 2 years proven performance in related assignment(s); or Non-related Associate Degree with 4 years proven performance in related assignment(s). In lieu of degree, a high school diploma with at least 6 years of equivalent knowledge and experience is acceptable.
  • Knowledge of computer and network digital systems used in business or process applications.
  • Must be able to participate in group problem solving including communicating effectively with both technical and nontechnical personnel, respect the ideas of others and accept the judgment of the group.
  • Must be familiar with available resource materials and be able to conduct timely research.
  • Must have a sense of when to ask for help and be comfortable in accepting guidance from other more senior technical personnel.
  • Candidate must be able to obtain and maintain a DOE “Q” security clearance. An active DOE clearance is not initially required to perform assigned duties. After award, the selected candidate will be notified when to apply for a clearance based on specific work assignments.
  • Excellent written and verbal communication abilities.
  • Knowledge of basic cybersecurity principles, protections, or frameworks (e.g., NIST).
  • Demonstrated willingness to learn new technologies, frameworks, and regulatory environments.
  • Ability to work on-site with limited teleworking options.
  • Foundational knowledge of log review, alert management, and email security practices.
  • Strong analytical and problem-solving skills.
  • Attention to detail and a commitment to maintaining high standards of security.

Nice To Haves

  • Detailed knowledge in specific operating systems is desirable.
  • Bachelor’s degree in any field (degree does not need to be in cybersecurity although a degree related to Information Technology is preferred).

Responsibilities

  • Under regular supervision, assists with the investigation, design, and development of software and/or hardware security technologies for SRS.
  • Support the security of SRS resources through designing/implementing/evaluating measures tied to the NIST Core Cyber Framework: Identify, Detect, Respond and Recover.
  • Work with vendors to develop technical solutions for site computer security needs.
  • Maintain the integrity of computer workstations, servers, and networks by maintaining access controls and software lifecycle process as needed.
  • Ensure data integrity and confidentiality through implementing the use of both encryption and data retention technologies.
  • Increase technical abilities through specialized vendor training, manuals and technical journals, software seminars, informational meetings, and practical experience.
  • Ensure that site/company policies and procedures are tied to customer requirements and our evaluated for effectiveness and proper implementation.
  • Review external indicators of compromise and evaluate them for impact both of potential related traffic and for the effect of adding restrictions based on them.
  • Perform review of both quarantined and end user reported emails for evidence of malicious intent.
  • Perform administration of logging and other security tooling both at the deployment level and policy configuration.
  • Collaborate with team members and management to strengthen the organization’s security posture.
  • Monitor network security alerts and assist in responding to potential threats in real time.
  • Review and analyze emails for suspected phishing and other malicious activity.
  • Ingest and apply threat intelligence to enhance organizational defenses.
  • Perform log review and alert management to identify and escalate security incidents.
  • Maintain and support cyber security toolsets and ensure their effective operation.
  • Assist in the development and implementation of basic security policies and procedures.

Benefits

  • paid time off
  • medical
  • dental
  • life
  • vision
  • disability insurance
  • pre-tax 401 (k) retirement account with Company matching contributions and 100% vesting for eligible participants beginning DAY 1
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service