F-35 - SOC Security Analyst - Active Secret Clearance Required

Clearance Level
Information Security
Arlington, Virginia

REQ#: G2019-65190

Do you hold an active US government security clearance? Are you interested in work that gives you the opportunity to use your skills to solve complex problems?  Would you like to join a team that encourages ingenuity and is mission driven?  Would you like to join an organization that makes a difference for our warfighters and our citizens?


GDIT was recently awarded the Joint Strike Fighter (JSF) F-35 IT program support contract.  We are providing knowledge-based, information assurance and cybersecurity IT services to the F-35 JSF Virtual Enterprise (JVE) network in support of the F-35 Lightning II Joint Program Office (JPO). Our services include program management, enterprise performance management, enterprise architecture, implementation of emerging capabilities and requirements, life cycle management, operations & maintenance, enterprise data management, service desk support and IT training.   General Dynamics Information Technology is looking for Security Operations Center (SOC) Analyst to help our US Government customers manage their IT security. You will be part of a fast-paced team that helps customers to reduce the impact of security incidents and ensures that critical business operations continue unhindered. This position is located in Arlington, VA.


Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.

  • Monitor and analyze security events and alerts from multiple sources, including security information and event management (SIEM) software, network and host-based intrusion detection systems, firewall logs, and system logs (Windows and Unix), and databases.
  • Separate true threats from false positives using network and log analysis and escalate possible intrusions and attacks.
  • Initiate tickets, document, and escalate to higher-level security analysts.
  • Perform triage of incoming issues (assess the priority, determine risk).
  • Work with customers to deploy hardware and software monitoring systems.
  • Maintain a strong awareness of the current threat landscape.



Bachelors Degree in Information Security, Computer Science, or other IT-related field. Exceptional candidates with proven experience in security/network operations will also be considered.


","Basic Qualifications
  • Knowledge of and experience with intrusion detection/prevention systems and SIEM software.
  • Strong knowledge and understanding of network protocols and devices.
  • Stong Experience with LogRythm and FireEye
  • Strong experience with Mac OS, Windows, and Unix systems.
  • Ability to analyze event logs and recognize attacker's behavior to detect cyber intrusions/attacks.
  • Ability to recognize attacker tools, tactics, and procedures to identify indicators of compromise (IOCs).
  • Ability to handle high pressure situations in a productive and professional manner.
  • Ability to work directly with customers to understand requirements for and get feedback on security services.
  • Strong written and verbal communication skills and the ability to present complex technical topics in clear and easy-to-understand language.
  • Strong teamwork and interpersonal skills, including the ability to work effectively with a distributed team.
  • Able and willing to work a shift in a SOC Operations environment, either 5:45 a.m. to 2:30 p.m. or 9:30 a.m. to 6:15 p.m.
  • Ability to provide tuning recommendations for security tools to tool administrators.
  • Familiarity with tools such as Wireshark, TCP Dump, Security Onion, and Splunk.

Basic knowledge of the following:

  • SIEM.
  • Packet Analysis.
  • SSL Decryption.
  • Malware Detection.
  • Network Monitoring Tools.
  • Case Management System.
  • Knowledge Base.
  • Web Security Gateway.
  • Email Security.
  • Data Loss Prevention.
  • Anti-Virus.

Preferred Qualifications

  • Experience in network/host vulnerability analysis, intrusion analysis, or related areas.
  • 2-4 years of hands-on SOC/TOC/NOC experience.
  • Security +, Network +, GCIA, GCIH, GMON, CCNA, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred.
  • Familiarity with GPO, Landesk, or other IT Infrastructure tools.
  • Understanding of programming/scripting languages and ability to run basic database queries.

Security Clearance: Secret clearance based upon a SSBI or SSBI-PR completed within the past five years.


" We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.

GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.