Overview

Incident Response Analyst, TS/SCI Polygraph Jobs in Mclean, Texas, USA at General Dynamics

Title: Incident Response Analyst, TS/SCI Polygraph

Company: General Dynamics

Location: Mclean, Texas, USA

Type: Full Time

Category: IT/Tech, Security

Position: Incident Response Analyst, TS/SCI Active Polygraph

Location: Mclean

Type of

Requisition

:

Regular Clearance Level Must Currently Possess:

Top Secret SCI + Polygraph Clearance Level Must Be Able to Obtain:

None Public Trust/Other

Required:

None Job Family:

Cyber Security

Job Qualifications:

Skills:

Cybersecurity, Malware, Risk Management

Certifications:

None

Experience:

8 + years of related experience

US Citizenship

Required:

Yes

Job Description:

We are GDIT. We support and secure some of the most complex government, defense, and intelligence projects across the country. At GDIT, cyber security is not just a singular part of our mission—it connects every one of us because it’s embedded into every aspect of what we do.

GDIT is your place. You make it your own by bringing your ideas and unique perspective to our culture. By owning your opportunity at GDIT, you are helping us ensure today is safe and tomorrow is smarter. Our work depends on an Incident Response Analyst joining our team to support ODNI Customer activities at McLean, VA.At GDIT, people are our differentiator.

As an Incident Response Analyst supporting the ODNI Customer, you will be trusted to work on

innovative solutions

that will transform and enhance the Enterprise IT environment to meet the growing global mission. In this role, a typical day will include:

Collect intrusion artifacts (e.g., source code, malware, trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.

Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents.

Coordinate incident response functions within a cloud environment.

Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat conditions and determine which security issues may have an impact on the enterprise.

Perform cyber defense trend analysis and reporting.

Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems.

Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.

Write and publish after-action reviews.

Write and publish cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies.

WHAT YOU’LL NEED:

Current TS/SCI clearance with polygraph

BA/BS degree or equivalent work experience8+ years of relevant work experience

Must meet Department of Defense (DOD) 8570.01-M baseline certification requirement for Information Assurances Technical (IAT) Level III CASP+CE, CCNP Security, CISA, or CISSP or Associate, GCED, GCIH, or CCSP.Minimum of 3 year experience Computer Forensic Analyst and or Computer Network Defense CND Forensic Analyst Skill in conducting vulnerability scans and recognizing vulnerability in security systems (e.g., Cloud Environments) AWS, Google, IBM, Azure, and Oracle.

 

Upload your CV/resume or any other relevant file. Max. file size: 800 MB.