Cyber Security Forensic Specialist, with Polygraph

Clearance Level
Top Secret SCI + Polygraph
Category
Information Security
Location
Herndon, Virginia

REQ#: RQ73054 Cyber Security Forensic Specialist, with Polygraph (Open)

Travel Required: None
Requisition Type: Regular
Job Description

We are GDIT. The people supporting and securing some of the most complex government, defense, and intelligence projects across the country. We ensure today is safe and tomorrow is smarter. Our work has meaning and impact on the world around us, but also on us, and that’s important.

GDIT is your place. You make it your own by embracing autonomy, seizing opportunity, and being trusted to deliver your best every day.
We think. We act. We deliver. There is no challenge that we can’t turn into opportunity. And our work depends on a Cyber Security Forensic Specialist joining our team to support Government activities at Herndon.

At GDIT, people are our differentiator. As a Cyber Security Forensic Specialist In this role, out Mission partner is seeking a candidate who will support the execution of multi-facted programs that supports dynamic mission sets. The candidate will have Network Engineering CI-centric experience and skills. They will support the mission partners overall Counterintelligence (CI) threat analysis efforts by performing technical assessments on IT infrastructure components, malicious code, and Advance Persistent Threat capabilities as they relate to computer networking. The candidate will conduct IT network forensic assessments across a full spectrum of computer and network devices, Windows/Linus hosts, mobile devices, virtual machines, and software and hardware, to determine potential weaknesses and vulnerabilities that may affect the confidentiality, integrity, and availability of corporate protected and sensitive information systems and data. Candidate skills should include experience in protocol packet-level analysis and developing comprehensive technical reports that provide recommendations to countermeasures as based on the identified techniques, tactics, procedures, and behavior patterns used by adversaries.

A typical day will include:

  • Asses new and evolving CovCom applications/devices for CI risks
  • Establish functional and technical specifications and standards, solve hardware/software interface problems, define input/output parameters, and ensure integration of the entire system or subsystem.
  • Work with engineers, systems analysts, programmers, technicians, scientists and top level managers in the design, testing and evaluation of systems.
  • Establish and maintain baseline technical documentation
  • Track and research hardware and software problems and/or anomalies reported or identified by audit activities
  • Test and evaluate hardware/software
  • Assist with network performance monitoring activities

WHAT GDIT CAN OFFER YOU

  • Alignment to a mission-critical role that directly impacts the customer’s ability to effectively execute its mission.
  • Direct engagement with contractor leadership that centers upon career development/mobility, enhanced performance evaluation, and corporate information sharing & networking opportunities.
  • Placement on a dynamic team of talented professionals that organically fosters an environment of innovation, collaboration, and trust.

Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.

Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.

Evaluate firewall change requests and assess organizational risk.

Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.

Assists with implementation of counter-measures or mitigating controls.

Conducts regular audits to ensure that systems are being operated securely, and information systems security policies and procedures are being implemented as defined in security plans.

Develops, tests, and operates firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools.

Safeguards the network against unauthorized infiltration, modification, destruction or disclosure.

Responds to queries and requests for computer security information and reports.

Conducts investigations of computer security violations and incidents, reporting as necessary to management.

Researches, evaluates, tests, recommends, communicates and implements new security software or devices.

Implements, enforces, communicates and develops security policies or plans for data, software applications, hardware, and telecommunications.

Develops materials for computer security education/awareness programs.

Provides recommendations to clients on information assurance engineering standards, implementation dependencies, and changing information assurance related technologies.

Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.

Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information.

Provides advanced guidance and leadership to less-experienced team members.

May serve as a team or task leader. (Not a people manager)

Provides information assurance project management, technical security staff oversight, and development of mission-critical technical documents.

Ensure compliance with regulations and privacy laws.

DESIRED QUALIFICATIONS: BA/BS (or equivalent experience), 10+ years of experience