Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
This position requires significant cyber technical capabilities as well as intelligence analysis skills (analytical methodology and practice, writing and production, briefing, identification of knowledge gaps, etc.). The team member must be able to coordinate with multiple external groups and to excel on individual projects as well as participate in joint efforts.
A bachelor's degree in Computer Science, Engineering or Information Technology and 3+ years' Exploitation experience. Two (2) additional years of related experience in computer incident response, network forensics, computer forensics or computer security in lieu of a degree.
Relevant commercial or military experience and another degree may be acceptable.
Minimum of three (3) years of experience in technical analysis, digital forensics, technical targeting, or similar relevant technical discipline.
Hands-on experience using commercially available data exploitation and visualization tools for analysis (e.g. MS Excel, Tableau, Wireshark, X-Ways, Encase)
Experience analyzing data sets (both small and large) for trends and patterns
Experience producing informational, contextual and/or intelligence products that embody and explain findings for a variety of audiences.
Familiarity with field HUMINT, cyber collection/threat mission or prior experience with in-depth knowledge of national intelligence agencies, law enforcement or DoD cyber components.
Familiarity with cable writing styles
Strong briefing and writing skills are a must as well as the ability to work well with teams or individually with minimal supervision
Demonstrate regional and/or functional expertise or a working knowledge of geographic regions of interest to the United States, including the Middle East
Knowledge of computing processing platforms (e.g. computers. mobile, internet of things) preferred.
Knowledge of Internet Request for Comments (RFC) standards desired.
Knowledge of mobile technologies to include cellular networks (WiFi, Bluetooth, etc.) preferred.
Experience working cyber security, such as penetration testing desired.
" We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.