Fort Huachuca, Arizona, USA
7 days ago
Forensics / Malware Senior Analyst (DCO)
REQ#: RQ183611Public Trust: None Requisition Type: Regular Your Impact

Own your opportunity to work with the largest government agency in the nation. Make an impact by advancing the Department of Defense’s mission to keep our country safe and secure.

Job Description

Seize your opportunity to make a personal impact as a Forensics / Malware Senior Analyst (DCO) supporting NETCOM. GDIT is your place to make meaningful contributions to challenging projects and grow a rewarding career.

GDIT is currently seeking a Forensics / Malware Senior Analyst (DCO) in Fort Huachuca, AZ. The Senior Threat Analyst is responsible for supporting the defense of Army networks.

This role performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. This role also measures effectiveness of defense-in-depth architecture against known vulnerabilities.

Essential Job Duties

Responsible for:

Analyzing the organization's cyber defense policies and configurations, and evaluating compliance with regulations and organizational directives.Maintaining a deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions.Maintaining knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing.Preparating audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions.Performing technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications).Designing, implementing, and administering network security for UNIX, Windows, Cisco, and Juniper technologies; Performing TCP-IP protocol implementation across designated Army networks;Leading security event monitoring, to include proactive and iterative log and packet analysis and anomaly detection;Performance of advanced incident investigation and timely and professional response;Creation, maintenance, and maturation of Standard Operating Procedures (SOPs) and training documentation for the implementation of appropriate incident responses, including clear and effective web, email, and telephonic communications;Conducting research and maintaining situational awareness of emerging threats and their countermeasures, to include monitoring external CSIRTS/CERTs;Documenting threats and their behavior, and effectively communicating threat mitigation strategies;Developing strong relationships with team members, managers, and government counterparts;Mentoring, coaching, and auditing of the activities of junior analysts;Performing routine event monitoring, trend analysis, and reporting;Exercising multi-tasking skills by managing events in multiple systems, applications, and priorities.

The above duties are normal for this position. The omission of specific statements of duties does not exclude them from being expected of this position if the work is similar, related, or a logical assignment for this position. Other duties may be required.

WHAT YOU’LL NEED TO SUCCEED:

Education:

MA/MS +10 -OR- BA/BS in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science +12 years of experience managing organizations similar in size, scope, and complexity.

Security Clearance Level: Active SECRET clearance

Required Skills and Abilities:

Proven experience and ability to leverage CND analysis toolsets to detect and respond to IT security incidents. The ability to develop and implement standard procedures for incident responses. Expertise in complex information systems and architectures that encompass multiple disparate databases, networks, and communication subsystems.Must meet DoD 8140 DCWF 541 requirements (B.S., CISA, CISM, GCIH, or GSNA)The following certifications:GCFA: GIAC Certified Forensic AnalystAn IAT II certification (CCNA-Security, CND, CySA+, GICSP, GSEC, Security+ CE, or SSCP) is requiredKnowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). Knowledge of application vulnerabilities.Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities.Knowledge of penetration testing principles, tools, and techniques.Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.Skill in the use of penetration testing tools and techniques.Skill in using network analysis tools to identify vulnerabilities (e.g., fuzzing, nmap, etc.). Skill in conducting application vulnerability assessments.Must be willing to work overtime, after hours, holidays, and weekends, as necessary. This position may require periods of non-traditional working hours, to include consecutive nights and/or weekends.

Preferred Skills:

First-hand knowledge of the mission and operational requirements of the U.S. Army.A demonstrated understanding of U.S. Army IT operational and technical requirements, and an advanced understanding of U.S. Army IT applications and network systems.One or more of the following certifications:CCE: Rocheston Certified Cybersecurity EngineerCFR: CyberSec First ResponderCySA+: CompTIA Cybersecurity Analyst plusGCFA: GIAC Certified Forensic AnalystGCFE: GIAC Certified Forensic ExaminerPenTest+: CompTIA Penetration Tester plusITIL v3 Foundations (or higher) certification, or able to achieve this certification w/in 90 days of contract start or hire date

Location: On Customer Site, Fort Huachuca, AZ

**This position is contingent upon award of contract**

GDIT IS YOUR PLACE:

401K with company matchComprehensive health and wellness packagesInternal mobility team dedicated to helping you own your careerProfessional growth opportunities including paid education and certificationsCutting-edge technology you can learn from

Rest and recharge with paid vacation and holidays

Confirm your E-mail: Send Email