F-35 SOC Analyst - Active Secret Required

Clearance Level
Interim Secret
Information Security
Arlington, Virginia

REQ#: RQ110368

Travel Required: Less than 10%
Requisition Type: Regular

Do you hold an active US government security clearance? Are you interested in work that gives you the opportunity to use your skills to solve complex problems?  Would you like to join a team that encourages ingenuity and is mission driven?  Would you like to join an organization that makes a difference for our warfighters and our citizens?

The Joint Strike Fighter (JSF) F-35 IT program support contract provides knowledge-based, information assurance and cybersecurity IT services to the F-35 Lightning II Joint Program Office (JPO). Our services include program management, enterprise performance management, enterprise architecture, implementation of emerging capabilities and requirements, life cycle management, operations & maintenance, enterprise data management, service desk support and IT training. 

We are currently seeking a SOC Analyst.

Job Duties:

Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.

  • Monitor and analyze security events and alerts from multiple sources, including security information and event management (SIEM) software, network and host-based intrusion detection systems, firewall logs, and system logs (Windows and Unix), and databases.
  • Separate true threats from false positives using network and log analysis and escalate possible intrusions and attacks.
  • Initiate tickets, document, and escalate to higher-level security analysts.
  • Perform triage of incoming issues (assess the priority, determine risk).
  • Work with customers to deploy hardware and software monitoring systems.
  • Maintain a strong awareness of the current threat landscape.

Minimum Education Required:

  • BS or BA degree in Cybersecurity, Computer Science, Engineering or  Information Technology, or relevant IT discipline.
  • ALLOWABLE SUBSTUTION: Six (6) years of related experience or four (4) years of related experience with an AA/AS degree.

Minimum Experience Required:

  • Six (6) years of experience designing and developing organizational information systems or upgrading legacy systems, employing best practices when implementing security controls within an information system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques.
  • One (1) year of the foregoing total experience shall have been as a team leader or supervisor. 
  • IAT Level II  certification in the Security Provision Category in accordance with DoD 8570.01-M, Information Assurance Workforce Improvement Program.

Basic Qualifications

  • Knowledge of and experience with intrusion detection/prevention systems and SIEM software.
  • Strong knowledge and understanding of network protocols and devices.
  • Strong Experience with SIEM Tool
  • Strong experience with Mac OS, Windows, and Unix systems.
  • Ability to analyze event logs and recognize attacker's behavior to detect cyber intrusions/attacks.
  • Ability to recognize attacker tools, tactics, and procedures to identify indicators of compromise (IOCs).
  • Ability to handle high pressure situations in a productive and professional manner.
  • Ability to work directly with customers to understand requirements for and get feedback on security services.
  • Strong written and verbal communication skills and the ability to present complex technical topics in clear and easy-to-understand language.
  • Strong teamwork and interpersonal skills, including the ability to work effectively with a distributed team.
  • Able and willing to work a shift in a SOC Operations environment, either 5:45 a.m. to 2:30 p.m. or 9:30 a.m. to 6:15 p.m.
  • Ability to provide tuning recommendations for security tools to tool administrators.
  • Familiarity with tools such as Wireshark, TCP Dump, Security Onion, and Splunk.

Basic knowledge of the following:

  • SIEM.
  • Packet Analysis.
  • SSL Decryption.
  • Malware Detection.
  • Network Monitoring Tools.
  • Case Management System.
  • Knowledge Base.
  • Web Security Gateway.
  • Email Security.
  • Data Loss Prevention.
  • Anti-Virus.

Preferred Qualifications

  • Experience in network/host vulnerability analysis, intrusion analysis, or related areas.
  • 2-4 years of hands-on SOC/TOC/NOC experience.
  • Security +, Network +, GCIA, GCIH, GMON, CCNA, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred.
  • Familiarity with GPO, Landesk, or other IT Infrastructure tools.
  • Understanding of programming/scripting languages and ability to run basic database queries.
  • Experience with Microsoft Azure security tools to include MDE, MDI, MDCA, and Sentinel

Security Clearance: Secret clearance based upon a SSBI or SSBI-PR completed within the past five years.

About Our Work

We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.

COVID-19 Vaccination

GDIT does not have a vaccination mandate applicable to all employees. To protect the health and safety of its employees and to comply with customer requirements, however, GDIT may require employees in certain positions to be fully vaccinated against COVID-19. Vaccination requirements will depend on the status of the federal contractor mandate and customer site requirements.

GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.