The Cyber Threat Analyst will support the customer’s overall cyber threat analysis efforts. The analyst must have the political acumen and the confidence to reach out and work with other agencies and industry stakeholders, to share threat information and work together to advance one another’s capabilities. Ensures that relevant threat indicators are infused in all aspects of program operations.
As a mid-level analyst, they must have experience in intrusion detection/response, firewall architecture, and emerging technologies. They possess at least cursory knowledge of security vulnerabilities and malicious actor tactics, techniques, and procedures (TTPs) to better evaluate the effectiveness of layered defenses and to provide strategic recommendations on new technical and non-technical protections; candidates without direct knowledge of these items must display acumen and interest in learning about these topics in a high-pace environment. The ideal candidate will be able to describe the following: Threat Actors, Campaigns, and other Indicators. Ideally, the candidate will be able to describe, and identify the benefits of: intrusion detection systems, intrusion analysis, data integration platforms, endpoint detection, data analytics, and cyber defense architectures.
Candidate should display solid written and oral communication skills to include experience with executive-level presentations. Candidate should have working understanding of the current state of cyber international relations, adversary tactics, and trends. Candidate will possess the ability to work quickly, and a willingness to complete ad hoc, time sensitive assignments.
A Bachelor’s Degree in Computer Science, Information Systems, Intelligence, English, Communications, History, International Affairs or Studies, or other related technical or liberal art discipline is desired.
Experience or education in Data Analytics, Data Science, or Data Engineering, a plus.
Certifications Desired: Ideally possess one of the following: CompTIA Security+, Certified Ethical Hacker (CEH), GIAC Certified Threat Intelligence Analyst (GCTI)
General Experience: At least 4 years of experience in intelligence or technical analysis. Demonstrable potential for developing oral and written communications.
Knowledge or interest in cyber threat intelligence analysis
Prior military or intelligence community experience and/or formal analytic training/certification, a plus
Demonstrable potential for developing analytical skills and the ability to effectively research, write, communicate and brief to varying levels of audiences to include at the executive level
Previous experience in intelligence, briefing, or threat analysis
Experience working with a SIEM (especially Splunk)
Security Clearance: Active TS (clearable to SCI), or able to get TS/SCI clearance.
** TEMPORARY ** Temporary position currently funded through February 16th.
This position requires being fully vaccinated against COVID-19 by December 8, 2021 or the start date, if after December 8.
We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.