[Close] 

Senior Analyst, Information Security

Active Top Secret / SCI Clearance required for consideration

Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.

1. Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents.

2. Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.

3. Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.

4. Evaluate firewall change requests and assess organizational risk.

5. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.

6. Assists with implementation of counter-measures or mitigating controls.

7. Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.

8. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.

9. Prepares incident reports of analysis methodology and results.

10. Provides guidance and work leadership to less-experienced technical staff members.

11. Maintains current knowledge of relevant technology as assigned.

12. Participates in special projects as required.


1.? Requires active Top Secret Clearance w/ SCI

2.? 5-8 years of related experience in data security administration.

3.? Comprehensive knowledge of data security administration principles, methods, and techniques.

4.? Certification in one or more specific technologies may be required, depending on job assignment.

5.? Requires familiarity with domain structures, user authentication, and digital signatures.

6.? Requires understanding of firewall theory and configuration.

7.? Requires understanding of DHS/DoD policies and procedures, including FIPS 199, FIPS 200, NIST 800-53, DHS 4300A SSH and other applicable policies.

?

For more than 50 years, General Dynamics Information Technology has served as a trusted provider of information technology, systems engineering, training and professional services to customers across federal, state, and local governments, and in the commercial sector. Over 40,000 GDIT professionals deliver enterprise solutions, manage mission-critical IT programs and provide mission support services worldwide. GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.



WIIS13

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.