The successful candidate will have experience working in a multi-tenant security operations environment supporting enterprise security operations incident response security application integration and engineering. They will possess investigative threat analysis techniques and understand the cyber/threat kill chain and how it applies to the duties of threat analysis. In addition, this candidate will be knowledgeable and possess the skills to engage and direct security engineering projects that require thorough knowledge of networking fundamentals, IP routing and switching, the ability to apply appropriate security controls to meet relevant regulatory requirements, application integration and the ability to research using independent thought, resulting in successful and efficient technical solutions.
This candidate will have a professional working attitude, and will be able to manage tasks independently and while working within teams, as directed. The candidate will possess excellent written and verbal communications skills and be able to write progress reports and whitepapers for both an internal audience and external customers as well as give oral summaries, demonstrations and guide technical training, as needed.
Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents.
Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.
Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
Evaluate firewall change requests and assess organizational risk.
Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.
Assists with implementation of counter-measures or mitigating controls.
Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.
Prepares incident reports of analysis methodology and results.
Provides guidance and work leadership to less-experienced technical staff members.
Maintains current knowledge of relevant technology as assigned.
Participates in special projects as required.
" We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.