United Global Technologies logo

Associate Computer Security Engineer - Cyber Monitoring

United Global TechnologiesAiken, SC

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Overview

Remote
On-site

Job Description

Education: Bachelor degree in an IT related discipline (e.g., Information Technology, Computer Technology. Software Engineering, Computer Science, Computer Engineering); or

  • Non-related Bachelor degree with 2 years proven performance in related assignment(s); or
  • Associate Degree in IT related discipline (e.g. Information Technology, Computer Technology, Software Engineering,

    Computer Science, Computer Engineering) with 2 years proven performance in related assignment(s); or

  • Non-related Associate Degree with 4 years proven performance in related assignment(s). In lieu of degree, a high school diploma with at least 6 years of equivalent knowledge and experience is acceptable. Knowledge of computer and network digital systems used in business or process applications. Detailed knowledge in specific operating systems is desirable.

Experience/Skills:

PREFERRED QUALIFICATIONS :

Attachment A Job Title: Associate Computer Security Engineer Working Title: Cyber Monitoring 

Seeking a motivated and detail-oriented entry-level Cyber Security Professional to join our Network Monitoring team. This position is ideal for candidates with foundational knowledge in cyber security who are ready to further develop their skills in a dynamic, mission-focused environment. The role is designed for individuals at the entry level. Onsite with limited telework from your primary residence.

The successful candidate will work closely with experienced cybersecurity staff and receive training in cybersecurity policies, best practices, and real-world defensive strategies. This collaborative environment will help the candidate build a strong foundation in both technical and procedural aspects of cybersecurity, while contributing to the protection of critical infrastructure. Additional Duties

  • Review external indicators of compromise and evaluate them for impact both of potential related traffic and for the effect of adding restrictions based on them.
  • Preform review of both quarantined and end user reported emails for evidence of malicious intent.
  • Perform administration of logging and other security tooling both at the deployment level and policy configuration.
  • Collaborate with team members and management to strengthen the organization’s security posture.
  • Monitor network security alerts and assist in responding to potential threats in real time.
  • Review and analyze emails for suspected phishing and other malicious activity.
  • Ingest and apply threat intelligence to enhance organizational defenses.
  • Perform log review and alert management to identify and escalate security incidents.
  • Maintain and support cyber security toolsets and ensure their effective operation.
  • Assist in the development and implementation of basic security policies and procedures.

Additional Education 

  • Bachelor’s degree in any field (degree does not need to be in cybersecurity although a degree related to Information Technology is preferred).

Additional Experience Qualifications Required

  • Excellent written and verbal communication abilities.
  • Knowledge of basic cybersecurity principles, protections, or frameworks (e.g., NIST).
  • Demonstrated willingness to learn new technologies, frameworks, and regulatory environments.
  • Ability to work on-site with limited teleworking options.
  • Foundational knowledge of log review, alert management, and email security practices.
  • Strong analytical and problem-solving skills.
  • Attention to detail and a commitment to maintaining high standards of security.

Skill Type

  • Bachelor degree in an IT related discipline (e.g., Information Technology, Computer Technology. Software Engineering, Computer Science, Computer Engineering); or Non-related Bachelor degree with 2 years proven performance in related assignment(s); or Associate Degree in IT related discipline (e.g. Information Technology, Computer Technology, Software Engineering, Computer Science, Computer Engineering) with 2 years proven performance in related assignment(s); or Non-related Associate Degree with 4 years proven performance in related assignment(s). In lieu of degree, a high school diploma with at least 6 years of equivalent knowledge and experience is acceptable. Knowledge of computer and network digital systems used in business or process a
  • Must be able to participate in group problem solving including communicating effectively with both technical and nontechnical personnel, respect the ideas of others and accept the judgment of the group.
  • Must be familiar with available resource materials and be able to conduct timely research and must have a sense of when to ask for help and be comfortable in accepting guidance from other more senior technical personnel
  • Excellent written and verbal communication abilities.
  • Knowledge of basic cybersecurity principles, protections, or frameworks (e.g., NIST).
  • Demonstrated willingness to learn new technologies, frameworks, and regulatory environments.
  • Ability to work on-site with limited teleworking options.
  • Foundational knowledge of log review, alert management, and email security practices.
  • Strong analytical and problem-solving skills.

Attention to detail and a commitment to maintaining high standards of security

Preferred Skills

  • Review external indicators of compromise and evaluate them for impact both of potential related traffic and for the effect of adding restrictions based on them.
  • Preform review of both quarantined and end user reported emails for evidence of malicious intent.
  • Perform administration of logging and other security tooling both at the deployment level and policy configuration
  • Collaborate with team members and management to strengthen the organization’s security posture.
  • Monitor network security alerts and assist in responding to potential threats in real time.
  • Review and analyze emails for suspected phishing and other malicious activity.
  • Ingest and apply threat intelligence to enhance organizational defenses.
  • Perform log review and alert management to identify and escalate security incidents.
  • Maintain and support cyber security toolsets and ensure their effective operation.
  • Assist in the development and implementation of basic security policies and procedures.

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.

pay-wall

FAQs About Associate Computer Security Engineer - Cyber Monitoring Jobs at United Global Technologies

What is the work location for this position at United Global Technologies?
This job at United Global Technologies is located in Aiken, SC, according to the details provided by the employer. Some roles may also include multiple work locations depending on the requirement.
What pay range can candidates expect for this role at United Global Technologies?
Employer has not shared pay details for this role.
What employment applies to this position at United Global Technologies?
The employer has not provided this information. This may be discussed during the hiring process.
What is the process to apply for this position at United Global Technologies?
You can apply for this role at United Global Technologies either through Sonara's automated application system, which helps you submit applications 10X faster with minimal effort, or by applying manually using the direct link on the job page.