This job is closed

We regret to inform you that the job you were interested in has been closed. Although this specific position is no longer available, we encourage you to continue exploring other opportunities on our job board.

NES Associatesposted 4 days ago
$74,800 - $101,200/Yr
Full-time - Mid Level
Falls Church, VA
Professional, Scientific, and Technical Services

About the position

We are GDIT. The people supporting and securing some of the most complex government, defense, and intelligence projects across the country. We ensure today is safe and tomorrow is smarter. Our work has meaning and impact on the world around us, but also on us, and that's important. GDIT is your place. You make it your own by embracing autonomy, seizing opportunity, and being trusted to deliver your best every day. We think. We act. We deliver. There is no challenge we can't turn into opportunity. At GDIT, people are our differentiator. We are seeking a Systems Operation Center Cyber Security Analyst to provide timely and professional cyber support. To be successful in this position you need to be collaborative and willing to work within a team. While you will need to be a self-starter, completing tasks on your own, working together is critical in this role. You will be interfacing with users and senior staff. Therefore, you should be articulate in your communications. You will need to explain technical intricacies to end users in a way that is easily understood. You will need to maintain a high-level customer service focus, exhibiting expertise, courtesy, timeliness, and professionalism. Provide technical support and troubleshooting services for incoming queries and issues related to computer systems, software, and hardware and assist the Service Desk Manager as needed. This is an IT Service Management contract in support of the operation, modernization, expansion, and further evolution of the ARNG's global Information Technology (IT) services including networking, compute, storage, infrastructure, applications, hosting, and program management services. The GECOS program supports the ARNG enterprise IT infrastructure, its Wide Area Network (WAN), authentication and directory services, cybersecurity, application hosting, and associated services. GECOS uses ITIL best practices framework as the basis for IT Service Management (ITSM) model.

Responsibilities

  • Performs forensic analysis of digital information and gathers and handles evidence.
  • Identifies network computer intrusion evidence and perpetrators.
  • Uses data collected from a variety of cyber defense tools to analyze events that occur within their environments for the purposes of mitigating threats.
  • Interprets, analyzes, and reports all events and anomalies in accordance with computer network directives.
  • Evaluates, tests, recommends, coordinates, monitors, and maintains cybersecurity policies, procedures, and systems.
  • Ensures that cybersecurity plans, controls, processes, standards, policies, and procedures are aligned with cybersecurity standards.
  • Identifies security risks and exposures, determines the causes of security violations, and suggests procedures to halt future incidents and improve security.
  • Develops techniques and procedures for conducting cybersecurity risk assessments and compliance audits.
  • Correlates data feeds and logs to analyze with known threats and incidents.
  • Responsible for performing correlation activities and trend analysis to discover attack patterns.
  • Provides guidance to junior-level staff, as necessary.
  • May serve as a team or task lead.
  • Ensures cybersecurity inspections, tests, assessments, and reviews are synchronized and coordinated with all stakeholders.
  • Assists in the implementation, management, and administration of the organization's structure and workflow within eMASS.
  • Conducts reviews of cybersecurity information papers and plans with various government agencies.
  • Assists in the enforcement of the DoD Cyberspace Workforce Framework and cybersecurity certification program.
  • Assists ARNG with the implementation of a documented and streamlined process for reviewing, processing, and approving systems access requests.

Requirements

  • Preferred bachelor's degree in cybersecurity, information assurance, computer science or a related technical discipline.
  • 4+ years of overall demonstrated experience in cybersecurity, information assurance or computer science.
  • Excellent problem solving, analytical, and decision-making capabilities.
  • Dependability and consistency in work attendance.
  • Customer service experience engaging with senior military and government leadership.
  • Ability to present ideas clearly through briefings and meetings.
  • Familiar with DoD 2875 account request processes.
  • Excellent communication and documentation skills.
  • Strong organizational and collaborative skills.
  • Ability to work under time constraints and adapt to changes in requirements.

Nice-to-haves

  • Familiar with ACTCS training system.
  • Maintain current industry knowledge of relevant concepts, practices, and procedures.
  • Ability to assimilate information rapidly and motivated to self-study new requirements.

Benefits

  • 401K with company match
  • Comprehensive health and wellness packages
  • Internal mobility team dedicated to helping you own your career
  • Professional growth opportunities including paid education and certifications
  • Cutting-edge technology you can learn from
  • Paid vacation and holidays
Hard Skills
Cloud Applications
1
Cyber Security
1
IP Addressing
1
Information Assurance
1
Information Technology Security Systems
1
4iF7gc1f qIgh8xVr
0
5injeyqQR sUKi2uMf
0
7mShjJX Tv0Qirpt
0
7s0pH zx2MfYnKq15
0
8vnzDRZ abmNjBCyk41x9X
0
ABrJy vfQVl eoZJaUIpR
0
B2oRDOYz4 oMO2N7fUeBvzdrk
0
C1Gw9M rNqemSX3I
0
F3LR4vE dIyH2azSs
0
HVLwcmuF7 qjlHwxr6
0
IYAC9WbDE1Qa KxfCD6oue7T
0
IunrXyl oHIqEbY4BwS
0
KeCP5pMd rKk9fcV7MRqyE2Q
0
L6dGYf Af6NIrwe
0
MOFX6yUPS qcvS1KG8R
0
P8w IC3H2lwc LM0hnDHbCWf
0
PKqst 2TsgI
0
QVkpBjrbo 21Og4mXt
0
RYzthGBCM 0EQKa8Wf
0
SntWel3jrNka e2z7mAtRCN
0
TPraJAKx zTdvWbmEuaV
0
USwmusnApJ pr7lBLf6
0
XsfbaBRk F60Vvhpf1
0
XuLOWtV PvQb67xmdtSjfX
0
Z79 mzgsDYc3R IHbswo34XYnTz
0
bxNSIU45r7lW AYhQ1dR2SW6
0
dna lbK8o1BU MbimTvwtpWZ
0
fLq60j7o nojhrd8UBCs1
0
hRiS3qHXsBZN LQ3vteuHxS
0
mEaDRdiZB izPCRQGBX
0
nZeQkstpSAE jIhiacNsv
0
pgSEh24f 5w6GENb2rcs0VTB
0
u4IfgwvT8 4W31XvOk
0
v71PsqweW AP7uNGRaZqF
0
w5LvWTSHJAR ykLMKWR68C
0
w6pbD afHRoOx1KX
0
wqNImVeru AiIWVt8CL
0
zgkI6TGPf7LE OGmrL6odZuTb
0
Soft Skills
Y4TDnFNO bjd9RpFr
0
YswcvQDHj ruosUxN
0
dRVYw6nKNMatu7OP
0
Unlock 41 more keywords by signing up for Teal+Sign Up
Build your resume with AI

A Smarter and Faster Way to Build Your Resume

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service