Req ID: RQ213703
Type of Requisition: Regular
Clearance Level Must Be Able to Obtain: None
Public Trust/Other Required: MBI (T2)
Job Family: Cyber and IT Risk Management
Skills:
Cyber Defense,Security Information and Event Management (SIEM),Security Operations
Experience:
7 + years of related experience
Job Description:
Seize your opportunity to make a personal impact as a Cyber Threat Analyst supporting the United States Postal Service. GDIT is your place to make meaningful contributions to challenging projects and grow a rewarding career.
At GDIT, people are our differentiators. As a Cyber Threat Analyst, you will help ensure today is safe and tomorrow is smarter. Our work depends on a Cyber Threat Analyst joining our team to analyze design, develop, implement, and support code for our government customer, the United States Postal Service.
HOW A CYBER THREAT ANALYST WILL MAKE AN IMPACT
In this role, a typical day will include:
Responsible for performing triage on all security escalations and detections to determine scope, severity, and root cause.
Monitor cyber security events, detecting incidents, and investigating incidents.
Identify, recommend strategies, develop, and implement automation use cases leveraging AI/ML capabilities.
Support deploying, configuring, testing, and maintaining Security Orchestration, Automation, and Response (SOAR) platform, and tools integrated with AI/ML capabilities to enhance threat detection, analysis and response.
Provide support to contract Program Manager, as necessary.
Effectively communicates technical information to non-technical audiences.
Influence others to comply with policies and conform to standards and best practices.
Investigates and analyzes potential online threats to an organization's computer systems and networks. Monitor for malicious activity, assess vulnerabilities, and develop strategies to mitigate risks. Essentially, they act as a proactive defense mechanism against cyberattacks.
WHAT YOU'LL NEED TO SUCCEED:
Education :
Bachelor's or Master's degree in Computer Science, Information Systems, Cybersecurity or other related fields. Or equivalent work experience.
NOTE: If resources do not have a relevant college degree, an additional 4 years of relevant work experience is required.
Required Experience :
7+ years of experience with security operations, threat hunting, and incident response
Experience in analyzing alerts from Cloud, SIEM, EDR, and XDR tools, and alerts tuning process with preference on SentinelOne, Armis, and Splunk.
Experience in configuring network devices and analyzing network traffic
Experience with Artificial Intelligence and Machine Learning (AI/ML) based security tools.
Experience in researching, developing, and implementing SOAR use cases.
Familiar with Security Orchestration, Automation, and Response (SOAR) platform
Familiarity with cybersecurity operation center functions.
Experience configuring and re-configuring security tools, including SentinelOne and Splunk.
Experience implementing Security frameworks, such as MITRE ATT&CK and NIST, and can interpret use cases into actionable monitoring solutions.
Develop, test and Implement dynamic Risk-Based Alerting (RBA)
Identifying and developing RBA and identifying use cases for SOAR and AI/ML.
Monitor and analyze alerts from various sources such as IDS/IPS, Splunk, Tanium, MS Defender, SentinelOne and Cloud security tools leveraging SOAR and AI/ML capabilities, and provide recommendation for further tuning of these alerts when necessary.
Analyze network traffic utilizing available tools and provide recommendations
Perform vulnerability assessments of recently discovered CVEs against USPS systems and network.
Assist in the process of configuring or re-configuring the security tools.
Perform analysis on hosts running on a variety of platforms and operating systems, to include, but not limited to, Microsoft Windows, UNIX, Linux, as well as embedded systems and mainframes.
Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave.
Test, evaluate, and verify hardware and/or software to determine compliance with defined specifications and requirements
MUST have one or more of the following Certification(s): CISSP, CISA, CISM, GIAC, RHCE.
Security Clearance Level :
Ability to obtain and maintain a Public Trust clearance and successfully pass a thorough Government background screening process requiring the completion of detailed forms and fingerprinting
This position has a U.S. residency requirement. The USPS security clearance process requires the selected candidate to have resided in the U.S. (including U.S. Territories) for the last five years as follows: U.S. Citizens cannot have left the U.S. (including U.S. Territories) for longer than 6 months consecutively in the last 3 years (unless they meet certain exceptions). Non-U.S. Citizens cannot have left the U.S. (including U.S. Territories) for longer than 90 days consecutively in the last 3 years.
Location :
Remote
GDIT IS YOUR PLACE:
401K with company match
Comprehensive health and wellness packages
Internal mobility team dedicated to helping you own your career.
Professional growth opportunities including paid education and certifications.
Cutting-edge technology you can learn from
Rest and recharge with paid vacation and holidays
zxc726 #CyberThreatAnalyst
The likely salary range for this position is $111,155 - $150,385. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. GDIT typically provides new employees with 15 days of paid leave per calendar year to be used for vacations, personal business, and illness and an additional 10 paid holidays per year. Paid leave and paid holidays are prorated based on the employee's date of hire. The GDIT Paid Family Leave program provides a total of up to 160 hours of paid leave in a rolling 12 month period for eligible employees. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.
We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.
Join our Talent Community to stay up to date on our career opportunities and events at https://gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans