- Lockheed Martin (North Charleston, SC)
- …role on the Cyber Support Operations team supporting the National Cyber Range Complex \(NCRC\) program in Charleston, South Carolina\. **Why Join Us** ... cyber warfighter\. As part of the National Cyber Range Complex \(NCRC\) program in Charleston,...in Charleston, South Carolina\. As a member of the Range Operations team, you will be responsible… more
- Adapt Forward (North Charleston, SC)
- Cyber Range Network Support Specialist North Charleston, SC Secret Clearance Required to start with upgrade to TS SCI As a Network Support Specialist, you will ... with fast-paced scenarios with dynamic technical requirements. Position Requirements and Duties Cyber Range Event Support: + Configure, deploy, and manage… more
- GovCIO (Columbia, SC)
- **Overview** GovCIO is hiring for a Senior Systems Administrator ( Linux and Windows) to provide on-going support for the administration of the core system ... and hardware + Provides regular monitoring and analysis regarding short and long- range planning for in-house systems + Prepares or ensures that appropriate… more
- Public Consulting Group (Columbia, SC)
- …Group LLC (PCG) is a leading public sector solutions implementation and operations improvement firm that partners with health, education, and human services agencies ... Collaborating with our Technology Consulting team, you will help organizations streamline operations and achieve strategic goals to serve the public better. We… more
- Duke Energy (Hartsville, SC)
- …such as account/log audits, patching, upgrades, antivirus protection, account management, cyber asset inventory, support of new installations, response to identified ... items as directed. The work also includes maintaining Robinson's cyber security program through documenting cyber asset...digital systems and firewalls. + Provide support to Plant Operations staff on issues with plant digital systems +… more
- Lincoln Financial (Columbia, SC)
- …identify suspicious and malicious activities. + Maintain expertise in Operating Systems (Windows/ Linux ) operations and artifacts to assist in investigations. + ... threats that evade existing security mechanisms and use that information to improve cyber resilience. + Create and modify SIEM dashboards to clearly identify scope… more