Information Security Analyst Senior TS/SCI Clearance
Please take this opportunity to join one of GDIT’s fastest long-standing growing programs! US Battlefield Information Collection and Exploitation System eXtended (US BICES-X) is a cutting-edge program supporting DoD intelligence information sharing on current and emerging global threats to mission and coalition partners and emerging nations. With an internationally dispersed team supporting each combatant command, the US BICES-X team is in direct support of the war fighter and their missions. We are seeking a creative and driven professional with a passion for solving real world issues on a cross-functional, fast paced team. You will be part of a dynamic team that is delivering a business-driven Enterprise Network to support BICES Global Enterprise Mission Support Services increasing performance, security, scalability, and stability while reducing costs and complexity resulting in increased supportability.
Review Cyber Intelligence and identify how current threats affect US BICES networks.
Performs Cybersecurity Detection and Incident Response activities for a large Program; coordinates with government Program staff, USAF, and other government agencies to assist in the creation, dissemination, direction, and auditing of program policy, standards, and operating procedures
Review cyber events and document Cybersecurity incidents as directed in SINCE and ServiceNow. Additionally, produce After Action Reports to close Cybersecurity incidents
This position will work within Cybersecurity environment monitoring, analyzing, and responding to Cybersecurity events and incidents not limited to; Analysis of Security Ops, SPLUNK, SIEM, IDS/IPS, ACAS, ESS (HBSS), FIREPOWER, and security related activities to secure and harden systems.
Work with vendors to ensure the CND Tool suits detect and capture required cyber incidents, to include latest industry threats and zero-days, ETC….
Review intelligent reports and provide daily Cyber Assessment on the impact to US BICES networks.
Recognize and codify attacker tools, tactics, and procedures (TTPs) in indicators of compromise (IOCs) that can be applied to current and future investigations
Utilize network and endpoint defensive tools to identify and analyze potential breaches or threat activity
Research and develop methods of tracking and detecting malicious activity within a network
Be available for after-hours support when required. Incident response is a vital positions to respond to critical cyber-attacks and our Enterprise is a 24/7 operation.
Participate in "hunt missions" using threat intelligence, analysis of anomalous log data and results of brainstorming sessions to detect and eradicate threat actors and protection teams on customer’s networks
Continuously improve processes for use across multiple detection sets for more efficient operations
Perform malware analysis with CND tools
Create, modify, and tune IDS/IDPS Signature Rule Generation (Snort)
Create Splunk dashboarding, reports, and alerts with reference to Security detection and Incident Response.
Utilize available resources to conduct Cybersecurity activities, and report to senior GDIT and government personnel on overall program security posture.
Communicate tactical and strategic threat information to Government leaders, Cybersecurity-Ops and A&A (formerly C&A) Staff to assist them in making cyber risk decisions and to mitigate threats
Coordinates with OUSDI, USAF, DISA, and other organizations in support of audits and inspections and provides all necessary documentation as required for Blue Team, Red Team, CPT, BGX Cert, SAVs, ST&Es, and CCRI
Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications, and operating systems
Assists with implementation of countermeasures or mitigating controls
Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices
Work with the Information Assurance Team, Security manager and GOVT ISSM to ensure any Data Spills are handled appropriately. Manage the Data Spill Process, working with external agencies as required to ensure cleanup and mitigation is accomplished within required times as set out by government.
Provides guidance and work leadership to less-experienced technical staff members
Maintains current knowledge of relevant technology as assigned
Participates in special projects as required.
Provide Incident Detection through understand malware and how to defend and mitigate infections. Triage malware, extracting relevant host and network-based indicators from malware samples.
5+ years of experience required.
Must possess and maintain a TS/SCI clearance.
BA/BS degree – may substitute additional years of experience
Comprehensive knowledge of data security administration principles, methods, and techniques
Must meet DOD 8570.01M requirements for IAT Level II & CSSP-Incident Responder.
Requires familiarity with System & Network concepts, user authentication, and use of Cyber Stacks
Requires understanding of DHS/DoD policies and procedures, including NIST 800-53, CJCSM 6510.01 and other applicable policies.
Security Operations Center (SOC) Experience
ESS (HBSS) Proficiency.
SPLUNK & SYSLOG data normalization.
The ability to work and set priorities on multiple projects/tasks at once and operate in a dynamic, fast-paced team-oriented environment.
The work is typically performed in an office environment, which requires normal safety precautions; work may require some physical effort in the handling of light materials, boxes, or equipment.
Depending on job assignment, additional specific certifications may be required
The above-listed job description is not intended to be, nor should it be construed as, exhaustive of all responsibilities, skills, efforts, or working conditions associated with this job. Requests for reasonable accommodations will be considered to enable individuals with disabilities to perform the principal (essential) functions of this job.
About Our Work
We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.
GDIT does not have a vaccination mandate applicable to all employees. To protect the health and safety of its employees and to comply with customer requirements, however, GDIT may require employees in certain positions to be fully vaccinated against COVID-19. Vaccination requirements will depend on the status of the federal contractor mandate and customer site requirements.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.