Associate Cyber Monitoring Engineer

E2 Consulting Engineers, Inc.Aiken, SC
Onsite

About The Position

Under regular supervision, assists with the investigation, design, and development of software and/or hardware security technologies for SRS. Supports the security of SRS resources through designing/implementing/evaluating measures tied to the NIST Core Cyber Framework: Identify, Detect, Respond and Recover. This is a motivated and detail-oriented entry-level Cyber Security Professional position ideal for candidates with foundational knowledge in cyber security who are ready to further develop their skills in a dynamic, mission-focused environment. The role is designed for individuals at the entry level. The successful candidate will work closely with experienced cybersecurity staff and receive training in cybersecurity policies, best practices, and real-world defensive strategies. This collaborative environment will help the candidate build a strong foundation in both technical and procedural aspects of cybersecurity, while contributing to the protection of critical infrastructure.

Requirements

  • Must be a US Citizen
  • Q Clearance is required
  • Bachelor degree in an IT related discipline (e.g., Information Technology, Computer Technology. Software Engineering, Computer Science, Computer Engineering); or Non-related Bachelor degree with 2 years proven performance in related assignment(s); or Associate Degree in IT related discipline (e.g. Information Technology, Computer Technology, Software Engineering, Computer Science, Computer Engineering) with 2 years proven performance in related assignment(s); or Non-related Associate Degree with 4 years proven performance in related assignment(s). In lieu of degree, a high school diploma with at least 6 years of equivalent knowledge and experience is acceptable.
  • Knowledge of computer and network digital systems used in business or process applications.
  • Detailed knowledge in specific operating systems is desirable.
  • Excellent written and verbal communication abilities.
  • Knowledge of basic cybersecurity principles, protections, or frameworks (e.g., NIST).
  • Demonstrated willingness to learn new technologies, frameworks, and regulatory environments.
  • Ability to work on-site with limited teleworking options.
  • Foundational knowledge of log review, alert management, and email security practices.
  • Strong analytical and problem-solving skills.
  • Attention to detail and a commitment to maintaining high standards of security.

Responsibilities

  • Safety is a primary responsibility in each job performed. Obtain safety training, obey safety rules. And make safety an integral part of each task. Take the necessary steps to stop work if continuing the job is unsafe or will create an unsafe condition.
  • Under regular supervision, assists with the investigation, design, and development of software and/or hardware security technologies for SRS.
  • Work with vendors to develop technical solutions for site computer security needs.
  • Maintain the integrity of computer workstations, servers, and networks by maintaining access controls and software lifecycle process as needed.
  • Ensure data integrity and confidentiality through implementing the use of both encryption and data retention technologies.
  • Increase technical abilities through specialized vendor training, manuals and technical journals, software seminars, informational meetings, and practical experience.
  • Ensure that site/company policies and procedures are tied to customer requirements and are evaluated for effectiveness and proper implementation.
  • Participate in group problem solving including communicating effectively with both technical and nontechnical personnel, respecting the ideas of others and accepting the judgment of the group.
  • Be familiar with available resource materials and be able to conduct timely research.
  • Know when to ask for help and be comfortable in accepting guidance from other more senior technical personnel.
  • Review external indicators of compromise and evaluate them for impact both of potential related traffic and for the effect of adding restrictions based on them.
  • Perform review of both quarantined and end user reported emails for evidence of malicious intent.
  • Perform administration of logging and other security tooling both at the deployment level and policy configuration.
  • Collaborate with team members and management to strengthen the organization’s security posture.
  • Monitor network security alerts and assist in responding to potential threats in real time.
  • Review and analyze emails for suspected phishing and other malicious activity.
  • Ingest and apply threat intelligence to enhance organizational defenses.
  • Perform log review and alert management to identify and escalate security incidents.
  • Maintain and support cyber security toolsets and ensure their effective operation.
  • Assist in the development and implementation of basic security policies and procedures.

Benefits

  • health, dental, vision, and life insurance
  • 401(k) with employer match
  • paid time off
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service