Cyber Security Analyst, with Polygraph

Clearance Level
Top Secret SCI + Polygraph
Information Security
McLean, Virginia

REQ#: RQ86601

Travel Required: None
Requisition Type: Regular

We are GDIT. The people supporting and securing some of the most complex government, defense, and intelligence projects across the country. We ensure today is safe and tomorrow is smarter. Our work has meaning and impact on the world around us, but also on us, and that’s important.

GDIT is your place. You make it your own by embracing autonomy, seizing opportunity, and being trusted to deliver your best every day.
We think. We act. We deliver. There is no challenge that we can’t turn into opportunity. And our work depends on a Cyber Security Analyst joining our team to support Government activities in McLean, VA.

At GDIT, people are our differentiator. As a Cyber Security Analyst supporting the customer, you will be trusted to execute multi-faced programs that support dynamic mission sets. In this role, a typical day will include:

  • Providing recommendations for end-to-end technical CI analysis
  • Conducting network or networking technology CI assessments, as well as security assessments of network and systems topologies
  • Documenting findings in formal CI risk assessment reports
  • Supporting external customer projects by providing network engineering and cyber security/CI analytic expertise and guidance to ensure the projects comply with Sponsor policy and regulation
  • Evaluating network operations using network management platforms, auditing functions, and log reviews
  • Attending working groups and customer/mission partner meetings


  • Education: Bachelor’s degree in Computer Science, Engineering, or a related technical discipline, or the equivalent combination of education, technical certifications or training, or work experience.
  • Minimum of 1 years related experience or relevant combination of education and experience.
  • Technical Skills:
    - Extensive knowledge and demonstrated experience on enterprise-scalable wireless mobility solution, multi-factor authentication products, and wireless intrusion detection systems
    - Extensive knowledge and demonstrated experience in a cloud-based computing environment supporting and administering cloud products and services
    - Demonstrated experience with networking concepts (TCP/IP, HTTP, HTTPS, FTP, RPC, SNMP, DNS, etc.) and proficiency with network traffic analysis tools
    - Demonstrated hands-on experience setting up, configuring, and troubleshooting network services, equipment, and devices such as switches, routers, servers, firewalls, etc.
    - Demonstrated experience analyzing and solving technical CI concerns and recommending countermeasure guidance to improve security/CI posture
    - Demonstrated experience analyzing, identifying, and providing software and hardware forensic examination support based on submitted requirements
    - Demonstrated experience working and interacting with other engineering groups to define, document, analyze, perform, and interpret tests for products, systems, and/or components
    - Demonstrated ability to apply critical thinking and use investigative mindset to conduct technical CI review/evaluation/assessment of technology solutions
    - Demonstrated ability to present findings and/or recommendations in written reports that are concise, well-constructed, and require minimal editing
    - Ability to translate highly technical and complex issues into terms comprehensible to non-technical decision makers
  • Security Clearance Level: Top Secret/SCI with Polygraph

Preferred Qualifications:

  • Hands-on experience in network evaluation an analysis, penetration testing and analysis, digital forensic evaluation analysis to include mobile device forensic (examining/imaging) analysis using commercial solutions such as EnCase, FTK, XRY, Cellebrite, MacQuisition, and Wireshark applications
  • General understanding of Sponsor’s current IT business processes and procedures
  • Experience supporting the Sponsor’s IT enterprise and operational requirements


  • Alignment to a mission-critical role that directly impacts the customer’s ability to effectively execute its mission.
  • Direct engagement with contractor leadership that centers upon career development/mobility, enhanced performance evaluation, and corporate information sharing & networking opportunities.
  • Placement on a dynamic team of talented professionals that organically fosters an environment of innovation, collaboration, and trust.

Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.

Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.

Evaluate firewall change requests and assess organizational risk.

Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.

Assists with implementation of counter-measures or mitigating controls.

Develops, tests, and operates firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools.

Develops and improves processes and direction for projects.

Conducts investigations of computer security violations and incidents, reporting as necessary to management.

Responds to queries and requests for computer security information and reports.

Safeguards the network against unauthorized infiltration, modification, destruction or disclosure.

Researches, evaluates, tests, recommends, communicates and implements new security software or devices.

Implements, enforces, communicates and develops security policies or plans for data, software applications, hardware, and telecommunications.

Develops materials for computer security education/awareness programs.

Provides recommendations to clients on information assurance engineering standards, implementation dependencies, and changing information assurance related technologies.

Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.

Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information.

Provides expert guidance and leadership to less-experienced team members.

May serve as a task or project leader. (Not a people manager)

Provides information assurance project management, technical security staff oversight, and development of mission-critical technical documents.

Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information.

Ensure compliance with regulations and privacy laws.

Recognized as a subject matter expert in information security.

DESIRED QUALIFICATIONS: BA/BS (or equivalent experience), 15+ years of experience


We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.

GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.