Do you hold an active US government security clearance? Are you interested in work that gives you the opportunity to use your skills to solve complex problems? Would you like to join a team that encourages ingenuity and is mission driven? Would you like to join an organization that makes a difference for our warfighters and our citizens?
GDIT was awarded the Joint Strike Fighter (JSF) F-35 IT program support contract. We are providing knowledge-based, information assurance and cybersecurity IT services to the F-35 JSF Virtual Enterprise (JVE) network in support of the F-35 Lightning II Joint Program Office (JPO). Our services include program management, enterprise performance management, enterprise architecture, implementation of emerging capabilities and requirements, life cycle management, operations & maintenance, enterprise data management, service desk support and IT training.
We are building a team of dedicated professionals and are currently seeking a Network Specialist, SOC Analyst.
Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses. Utilize Security Information and Event Manager (SIEM) system leveraging McAfee, or LogRythm. Provide network defense system implementation, installation and configuration support to installations and forces operating in deployed environments. Maintain a network defense test environment to evaluate new applications, signatures, rules, filters and configurations of managed network defenses systems. Follows RMF, DODI 8500 (Cybersecurity) series and Common Criteria bodies of knowledge.
Monitor and analyze security events and alerts from multiple sources, including security information and event management (SIEM) software, network and host-based intrusion detection systems, firewall logs, and system logs (Windows and Unix), and databases.
Separate true threats from false positives using network and log analysis and escalate possible intrusions and attacks.
Initiate tickets, document, and escalate to higher-level security analysts or Cyber Security Service Provider if necessary
Perform triage of incoming issues (assess the priority, determine risk).
Work with customers to deploy hardware and software monitoring systems.
Maintain a strong awareness of the current threat landscape.
Excellent teamwork skills.
Knowledge of and experience with intrusion detection/prevention systems and SIEM software.
Knowledge and understanding of network protocols and devices.
Experience with Mac OS, Windows, and Unix systems.
Ability to analyze event logs and recognize signs of cyber intrusions/attacks.
Ability to handle high pressure situations in a productive and professional manner.
Written and verbal communication skills and the ability to present complex technical topics in clear and easy-to-understand language.
Teamwork and interpersonal skills, including the ability to work effectively with a distributed team.
Ability to provide tuning recommendations for security tools to tool administrators.
Familiarity with tools such as Wireshark, TCP Dump, Security Onion, and Splunk.
Basic knowledge of the following:
Network Monitoring Tools
Case Management System
Web Security Gateway
Data Loss Prevention
Experience in network/host vulnerability analysis, intrusion analysis, cyber threat intelligence, or related areas.
Familiarity with GPO, LANDesk, SolarWinds, or other IT Infrastructure tools.
Understanding of programming/scripting languages and ability to run basic database queries.
Minimum Education Required:
BS or BA degree in Cybersecurity, Computer Science, Engineering or Information Technology, or relevant IT discipline.
ALLOWABLE SUBSTUTION: Six (6) years of related experience or four (4) years of related experience with an AA/AS degree.
Minimum Experience Required:
Six (6) years of experience designing and developing organizational information systems or upgrading legacy systems, employing best practices when implementing security controls within an information system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques.
One (1) year of the foregoing total experience shall have been as a team leader or supervisor.
IAT Level II certification in the Security Provision Category in accordance with DoD 8570.01-M, Information Assurance Workforce Improvement Program, (or achieve within six months).
Security Clearance: Secret clearance based upon a SSBI or SSBI-PR completed within the past five years.
We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.