Must be local to the area; Some telecommuting allowed.
Research and analyze classified reporting to identify current and emerging threat trends and work with intelligence community partners to produce and offer classified threat intelligence products and briefings to internal and external partners and stakeholders:
Responsibilities Include: Provide 24/7 research and reporting support to customer Senior Leadership, Duty Officers, partners and stakeholders o Communicate, coordinate, share information, and work closely with customer components Develop informational and analytic products daily designed to increase situational awareness and advanced warning of current and emerging cybersecurity threats and risks o Report on underlying patterns of behavior by conducting detailed analysis of incidents, threats and risks and associated impacts and consequences, vulnerabilities, tactics, techniques and procedures (TTP), and other malicious and non-malicious indicators Provide daily threat briefings to the Watch Floor during the customer Director’s Morning Brief Develop operational-level trends analysis products that leverage customer internal data repositories, classified and unclassified open source reporting to provide situational awareness of emerging cyber threat and risk trends to customer partners, stakeholders, and customers Provide operational analysis coordination, research, and reporting support to the customer during internal cyber incident management exercises as well as national-level cyber exercises o Communicate, coordinate, share information, and work closely with customer components and stakeholders Track and manage internal and external requests for information (RFIs) and requests for analysis (RFAs) for the entire Branch and produce weekly, monthly, quarterly, and annual performance metrics reports
Basic Qualifications: Bachelor’s Degree. and 5 years experience Active Top Secret Security Clearance with ability to obtain a DHS SCI, as well as obtain and maintain a favorably adjudicated DHS background investigation (EOD) for continued employment. Previous work experience in cyber threat analytics. Experience working in cyber intelligence requiring, at minimum, a moderate technical acumen.
This position requires being fully vaccinated against COVID-19 by December 8, 2021 or the start date, if after December 8.
We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.