Forensics / Malware Senior Analyst (DCO)

Clearance Level
Top Secret/SCI
Category
Cyber Security
Location
Fort Huachuca, Arizona
(Onsite Workplace)
Key Skills For Success

Cyber Defense

Cybersecurity

Information Technology Security

Network Security

REQ#: RQ183611
Public Trust: None
Requisition Type: Regular
Your Impact

Own your opportunity to work with the largest government agency in the nation. Make an impact by advancing the Department of Defense’s mission to keep our country safe and secure.

Job Description

Seize your opportunity to make a personal impact as a Forensics / Malware Senior Analyst (DCO) supporting NETCOM. GDIT is your place to make meaningful contributions to challenging projects and grow a rewarding career.

GDIT is currently seeking a Forensics / Malware Senior Analyst (DCO) in Fort Huachuca, AZ. The Senior Threat Analyst is responsible for supporting the defense of Army networks.

This role performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. This role also measures effectiveness of defense-in-depth architecture against known vulnerabilities.

Essential Job Duties

Responsible for:

  • Analyzing the organization's cyber defense policies and configurations, and evaluating compliance with regulations and organizational directives.
  • Maintaining a deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions.
  • Maintaining knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing.
  • Preparating audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions.
  • Performing technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications).
  • Designing, implementing, and administering network security for UNIX, Windows, Cisco, and Juniper technologies;
  • Performing TCP-IP protocol implementation across designated Army networks;
  • Leading security event monitoring, to include proactive and iterative log and packet analysis and anomaly detection;
  • Performance of advanced incident investigation and timely and professional response;
  • Creation, maintenance, and maturation of Standard Operating Procedures (SOPs) and training documentation for the implementation of appropriate incident responses, including clear and effective web, email, and telephonic communications;
  • Conducting research and maintaining situational awareness of emerging threats and their countermeasures, to include monitoring external CSIRTS/CERTs;
  • Documenting threats and their behavior, and effectively communicating threat mitigation strategies;
  • Developing strong relationships with team members, managers, and government counterparts;
  • Mentoring, coaching, and auditing of the activities of junior analysts;
  • Performing routine event monitoring, trend analysis, and reporting;
  • Exercising multi-tasking skills by managing events in multiple systems, applications, and priorities.

The above duties are normal for this position. The omission of specific statements of duties does not exclude them from being expected of this position if the work is similar, related, or a logical assignment for this position. Other duties may be required.

WHAT YOU’LL NEED TO SUCCEED:

  • Education:

MA/MS +10 -OR- BA/BS in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science +12 years of experience managing organizations similar in size, scope, and complexity.

Security Clearance Level: Active TS/SCI clearance

Required Skills and Abilities:

  • Proven experience and ability to leverage CND analysis toolsets to detect and respond to IT security incidents.
  • The ability to develop and implement standard procedures for incident responses.
  • Expertise in complex information systems and architectures that encompass multiple disparate databases, networks, and communication subsystems.
  • Must meet DoD 8140 DCWF 541 requirements (B.S., CISA, CISM, GCIH, or GSNA)
  • The following certifications:
    • GCFA: GIAC Certified Forensic Analyst
    • An IAT II certification (CCNA-Security, CND, CySA+, GICSP, GSEC, Security+ CE, or SSCP) is required
  • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
  • Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
  • Knowledge of application vulnerabilities.
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
  • Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities.
  • Knowledge of penetration testing principles, tools, and techniques.
  • Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.
  • Skill in the use of penetration testing tools and techniques.
  • Skill in using network analysis tools to identify vulnerabilities (e.g., fuzzing, nmap, etc.).
  • Skill in conducting application vulnerability assessments.
  • Must be willing to work overtime, after hours, holidays, and weekends, as necessary. This position may require periods of non-traditional working hours, to include consecutive nights and/or weekends.

Preferred Skills:

  • First-hand knowledge of the mission and operational requirements of the U.S. Army.
  • A demonstrated understanding of U.S. Army IT operational and technical requirements, and an advanced understanding of U.S. Army IT applications and network systems.
  • One or more of the following certifications:
    • CCE: Rocheston Certified Cybersecurity Engineer
    • CFR: CyberSec First Responder
    • CySA+: CompTIA Cybersecurity Analyst plus
    • GCFA: GIAC Certified Forensic Analyst
    • GCFE: GIAC Certified Forensic Examiner
    • PenTest+: CompTIA Penetration Tester plus
    • ITIL v3 Foundations (or higher) certification, or able to achieve this certification w/in 90 days of contract start or hire date

Location: On Customer Site, Fort Huachuca, AZ

**This position is contingent upon award of contract**

GDIT IS YOUR PLACE:

  • 401K with company match
  • Comprehensive health and wellness packages
  • Internal mobility team dedicated to helping you own your career
  • Professional growth opportunities including paid education and certifications
  • Cutting-edge technology you can learn from

Rest and recharge with paid vacation and holidays

Work Requirements
Years of Experience

10 + years of related experience

* may vary based on technical training, certification(s), or degree

Certification

Travel Required

Less than 10%

Citizenship

U.S. Citizenship Required

Salary and Benefit Information

The likely salary range for this position is $159,889 - $216,321. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
View information about benefits and our total rewards program.

About Our Work

We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 30 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.

GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.