Incident Response Analyst (Active Polygraph Required)
Job description
Travel Required: Less than 10%
Public Trust: None
Requisition Type: Regular
We are GDIT. We support and secure some of the most complex government, defense, and intelligence projects across the country. At GDIT, cyber security is not just a singular part of our mission—it connects every one of us because it’s embedded into every aspect of what we do.
GDIT is your place. You make it your own by bringing your ideas and unique perspective to our culture. By owning your opportunity at GDIT, you are helping us ensure today is safe and tomorrow is smarter. Our work depends on an Incident Response Analyst joining our team to support ODNI Customer activities at McLean, VA.
At GDIT, people are our differentiator. As an Incident Response Analyst supporting the ODNI Customer, you will be trusted to work on innovative solutions that will transform and enhance the Enterprise IT environment to meet the growing global mission. In this role, a typical day will include:
- Collect intrusion artifacts (e.g., source code, malware, trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.
- Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents.
- Coordinate incident response functions within a cloud environment.
- Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat conditions and determine which security issues may have an impact on the enterprise.
- Perform cyber defense trend analysis and reporting.
- Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems.
- Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
- Write and publish after-action reviews.
- Write and publish cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies.
WHAT YOU’LL NEED:
- Current TS/SCI clearance with polygraph
- BA/BS degree or equivalent work experience
- 10+ years of relevant work experience
- Must meet Department of Defense (DOD) 8570.01-M baseline certification requirement for Information Assurances Technical (IAT) Level III CASP+CE, CCNP Security, CISA, or CISSP or Associate, GCED, GCIH, or CCSP.
- Minimum of 3 year experience Computer Forensic Analyst and or Computer Network Defense CND Forensic Analyst
- Skill in conducting vulnerability scans and recognizing vulnerability in security systems (e.g., Cloud Environments) AWS, Google, IBM, Azure, and Oracle.
- Skill in preserving evidence integrity according to standard operating procedures or national standards.
- Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions.
- Knowledge of cyber defense and information security policies, procedures, and regulations.
- Skill in protecting a network against malware. (e.g., NIPS, anti-malware, restrict/prevent external devices, spam filters).
- Knowledge of incident categories, incident responses, and timelines for responses.
- Knowledge of incident response and handling methodologies.
- Skill in performing damage assessments.
- Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
- Skill in securing network communications.
- Skill in using security event correlation tools.
- Knowledge of network services and protocols interactions that provide network communications.
- Knowledge of OSI model and underlying network protocols (e.g., TCP/IP).
- Knowledge of cloud service models and how those models can limit incident response.
- Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
- Knowledge of system administration, network, and operating system hardening techniques.
- Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
- Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state-sponsored, and nation sponsored).
- Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
- Knowledge of malware analysis concepts and methodologies.
- Skill of identifying, capturing, containing, and reporting malware.
- Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
- Knowledge of what constitutes a network attack and a network attack’s relationship to both threats and vulnerabilities.
- Skill in recognizing and categorizing types of vulnerabilities and associated attacks.
WHAT GDIT CAN OFFER YOU:
- Full-flex work week
- 401K with company match
- Internal mobility team dedicated to helping you own your career
- Collaborative teams of highly motivated critical thinkers and innovators
- Ability to make a real impact on the world around you
Not sure this job’s the one for you? Check out our other openings at gdit.com/careers.
Do you have a friend or colleague this posting describes? Let them know about the opportunity
#OpportunityOwned
#GDITCareers
#WeAreGDIT
#JET
About Our Work
We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.
COVID-19 Vaccination
GDIT does not have a vaccination mandate applicable to all employees. To protect the health and safety of its employees and to comply with customer requirements, however, GDIT may require employees in certain positions to be fully vaccinated against COVID-19. Vaccination requirements will depend on the status of the federal contractor mandate and customer site requirements.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
colinoncars.com is the go-to platform for job seekers looking for the best job postings from around the web. With a focus on quality, the platform guarantees that all job postings are from reliable sources and are up-to-date. It also offers a variety of tools to help users find the perfect job for them, such as searching by location and filtering by industry. Furthermore, colinoncars.com provides helpful resources like resume tips and career advice to give job seekers an edge in their search. With its commitment to quality and user-friendliness, colinoncars.com is the ideal place to find your next job.