CSOC Tier 3 TS/SCI

Clearance Level
Top Secret/SCI
Category
Cyber Security
Locations
Springfield, Virginia
St Louis, Missouri

REQ#: RQ108163

Travel Required: 10-25%
Public Trust: None
Requisition Type: Regular

Position Overview:

As the Senior Cyber Security Operations Specialist, you will be providing CSOC Tier 3 services. This involves 24x7x365 coordination, execution, and implementation of all actions required for the containment, eradication, and recovery measures for events and incidents.

  • CSOC Tier 3 services includes malware and implant analysis, and forensic artifact handling and analysis
  • When a CIRT is stood up, serve as C-IRT members as required and serve under the direct control of, and take direction from, the Government C-IRT Commander
  • Develops, documents, and provides to the Government incident investigation reports which include sufficient information to document the entire lifecycle of the incident and the response, including but not limited to adversary and friendly forces activity, host and network analysis, timelines, and recommendations for corrective actions, recommendations for new Tactics, Techniques, and Procedures (TTP) and other recommendations as appropriate, within 30 days of C-IRT stand-down
  • Conduct Quality Control reviews of a percentage closed CSOC Tier 2 tickets each week to ensure proper analysis, categorization, documentation, and notification
  • While not in a period of incident response, the Contractor shall conduct continuous exercises and dry runs to improve response outcomes in the event of a cyber-incident
  • Develop and coordinate courses of action with various Government and contract stakeholders, and when properly authorized, execute Defensive Cyber Operations on internal networks and systems
  • Coordinate and implement tasks, performing analysis, and building/documenting response activities required during cyber security incident response, to include but not limited to actions such as implementing containment measures, IP blocks, domain blocks, and disabling user accounts on direction of the Government
  • Coordinate with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counterintelligence personnel as required to perform advanced investigation and triage of incidents
  • Collaborate with appropriate authorities in the production of security incident reports
  • Categorize incidents and events
  • Coordinate with other contracts, organizations, activities, and other services as appropriate to ensure incidents are properly reported, contained, and eradicated
  • Coordinate with other contracts, organizations, activities, and other services as appropriate to de-conflict blue / red team activity with open incidents/events
  • Coordinate with other contracts, organizations, activities, and services to ensure customer recovers from an incident/event
  • Build timelines, documents, briefings, and other products as required to inform stakeholders of incident response actions, analysis, and the impact of both adversary activity and blue force response actions
  • Document actions taken and analysis in the authorized ticketing system to a level of detail where the actions taken and analysis are capable of being systematically reconstructed
  • Develop, generate, and update reports in authorized external reporting systems as directed
  • Develop, maintain, and execute custom scripts, tools, and capabilities to collect and analyze data, and to respond to incidents/events
  • Identify Indicators of Compromise to send to Cybersecurity stakeholders and other Contract Services
  • Perform dynamic malware analysis, and when required, digital media analysis and malware reverse engineering on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis
  • Provide input to and coordinates with all applicable stakeholders to develop and deliver the CSOC Daily Standup, and the CSOC Weekly Operations Brief

Requirements:

  • TS/SCI clearance and ability to obtain a CI Poly within 6months of hire
  • IAT Level II Certification (current) that is compliant with DoD 8140.01 and DoD 8570.01-M
  • Within Six (6) months of hire date, employee must be able to obtain CSSP Incident Responder certification compliant with DoD 8140.01 and DoD 8570.01-M
  • Bachelors degree (Engineering, Computer Science or related field) and 6+ years of relevant work experience and/or an equivalent combination of years of experience and education

COVID-19 Vaccination Requirement: To protect the health and safety of its employees and to comply with customer requirements, GDIT may require employees in certain positions to be fully vaccinated against COVID-19. Vaccination requirements will depend on the status of the federal contractor mandate and customer site requirements.

We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.

GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.