General Dynamics Information Technology Bethesda, MD, USA
Mar 28, 2020Full time
General Dynamics Information Technology is actively looking for a Security Analyst with Nessus and Splunk toolset experience. The Analyst will be part of a team that develops and operates security alerts within the robust National Institutes of Health (NIH) TOC team. As a key participant within a security operations maturity model assessment team, you will share responsibilities for conducting FISMA-compliant Incident response gap analysis. You will also share in responsibilities for maintaining security systems and conducting security operations for accredited infrastructures and applications. Direct responsibilities will be based on your greatest strengths and interests. In this position, you will have the opportunity to directly impact the lives of millions of Americans by working on systems that increase access to medical research and improves health outcomes across the cancer, opioid and infectious disease spectrum. The ideal candidate will be someone who is looking for continual growth, can think strategically and perform tactically, and mostly importantly, wants to make a positive difference to the people around them. RESPONSIBILITIES The information security professional will be part of a team involved in the security alert analysis, and maintenance of the toolsets for numerous FISMA systems for a federal health care agency. Specific responsibilities include: Provides basic Monitoring and Analysis support of computer security events Assess Current Maturity of Incident Response Processes and Procedures Perform initial triage Report computer security events, in accordance with established processes and procedures IDS monitoring and analysis, network traffic and log analysis, prioritization and differentiation between potential intrusion attempts, determination of false alarms, insider threat and APT detection, and malware analysis/forensics. Create and track investigations to resolution. Compose security alert notifications. Advise incident responders in the steps to take to investigate and resolve computer security incidents. Required Skills and Experience Bachelor's Degree in Computer Science or a related technical discipline, and 5 + years of experience or the equivalent combination of education, professional training or work experience Must be able to obtain and maintain a Public Trust Clearance. 1 plus years of related experience with Splunk and/or SIEM technologies. Desired Experience Experience working in a SOC environment is desired Master's Degree We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done. GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.