Eagle Alliance is looking for a Cyber Security Analyst that holds a TS/SCI with Poly clearance.
Performs forensic analysis of digital information, gathers, and handles evidence. Identifies network computer intrusion evidence and perpetrators. Investigates computer fraud or other electronic crimes, crack files and system passwords, detects steganography and recovers deleted, fragmented and corrupted data from digital media of all types. Ensures chain of custody and control procedures, documents procedures and findings in a manner suitable for courtroom presentation and prepares comprehensive written notes and reports. May be required to testify in court as expert witnesses.
Provides Information Systems Incident Response and Network Defense support services to the client. Provides integrated operational capability to detect, monitor, analyze and respond to unauthorized access. Reviews and analyzes network events for possible security shortfalls and identifies activities that corresponds with intrusions and security events. Utilizes client's tools, capability, and processes to identify network traffic, system or security devices for information supporting violations of security policy and vulnerabilities that could affect IT assets. Identifies and validates cyber threats and potential impact to the IT infrastructure. Provides detailed and accurate real-time information to customers and operation managers.
CWIP - IAT level II Compliance:
Persons provide network environment (NE) and advance level compute environment (CE) support. Responsible for finding and fixing unprotected vulnerabilities and ensuring that remote access points are well secured. Focuses on threats and vulnerabilities and improving the security of systems. Demonstrates a mastery of the functions of the IAT Level I position. Monitors, tests and troubleshoots hardware and software IA problems pertaining to the network environment. Recommends and schedules IA related repairs to include performing IA related customer support functions such as installation, configuration, troubleshooting, customer assistance, in response to customer requirements for the network environment (NE). Analyzes patterns of non-compliance and identifies vulnerabilities resulting from a departure from the implementation plan or that were not apparent during testing. Provides leadership and direction to IA operations personnel. Implement applicable patches including IAVAs, and IAVBs for their environment. (Reference: Policy 6-34) for Cyber Workforce Improvement Plan (CWIP).
BA/BS or equivalent + 6 months related experience
DoD 8570 IAT Level II or higher and CEH required
SHIFT WORK required for 24x7 support - Essential personnel
Strong analytical and problem solving skills
Leadership skills to guide and mentor less experienced personnel
Strong communications skills
Ability to lead and work as part of a team
We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.