Senior SOC Analyst Job at General Dynamics Information Technology, Springfield, VA

YnNjQllGZG5vaFdHT0thLzZ3azg4T2EzYWc9PQ==
  • General Dynamics Information Technology
  • Springfield, VA

Job Description

Public Trust: None
Requisition Type: Regular
Your Impact

Own your opportunity to work with the largest government agency in the nation. Make an impact by advancing the Department of Defense’s mission to keep our country safe and secure.

Job Description

Please take this opportunity to join one of GDIT’s fastest long-standing growing programs!  US Battlefield Information Collection and Exploitation System eXtended (US BICES-X) is a cutting edge program supporting DoD intelligence information sharing on current and emerging global threats to mission and coalition partners and emerging nations. With an internationally dispersed team supporting each combatant command, the US BICES-X team is in direct support of the war fighter and their missions. We are seeking a creative and driven professional with a passion for solving real world issues on a cross-functional, fast paced team. 

Responsibilities :

  • Review cyber intelligence and identify how current threats affect US BICES networks.
  • Perform cyber detection and incident response activities for a large program; coordinates with government program staff, USAF, and other government agencies to assist in the creation, dissemination, direction, and auditing of program policy, standards, and operating procedures.
  • Review cyber events and document cybersecurity incidents utilizing ServiceNow. 
  • Produce after action reports following closure of cybersecurity incidents.
  • This position will work within cybersecurity environment monitoring, analyzing, and responding to cybersecurity events and incidents not limited to; Analysis of data within SPLUNK, IDS/IPS, ACAS, ESS (HBSS), FIREPOWER, and security related activities to secure and harden systems.
  • Work with vendors to ensure the DCO tool suites detect and capture required cyber incidents, to include the latest industry threats and zero-days, etc.
  • Review intelligence reports and provide a daily cyber assessment on the impact to US BICES networks.
  • Recognize and codify attacker tools, tactics, and procedures (TTPs) in indicators of compromise (IOCs) that can be applied to current and future investigations
  • Utilize network and endpoint defensive tools to identify and analyze potential breaches or threat activity.
  • Research and develop methods of tracking and detecting malicious activity within a network
  • Be available for after-hours support when required.  Incident response is a vital position to respond to critical cyber-attacks, and our Enterprise is a 24/7 operation. 
  • Participate in daily use of threat intelligence, analysis of anomalous log data and results of brainstorming sessions to detect and eradicate threat actors and protection teams on customer’s networks.
  • Perform malware analysis with DCO tools.
  • Create, modify, and tune IDS/IDPS Signature Rule Generation (Snort)
  • Create, modify, and tune Splunk dashboards, reports, and alerts related to real-time detection and incident response.
  • Utilize available resources to conduct Cybersecurity activities, and report to senior GDIT and government personnel on overall program security posture.
  • Communicate tactical and strategic threat information to Government leadership, Cybersecurity Operations Team and the Assessment & Authorization Team to assist them in making cyber risk decisions and to mitigate threats.
  • Coordinate with USAF, DISA, and other organizations in support of audits and inspections and provides all necessary documentation as required for Blue Team, Red Team, CPT, BGX Cert, SAVs, CVAs, ST&Es, and CCRI
  • Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications, and operating systems
  • Assists with implementation of countermeasures or mitigating controls.
  • Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
  • Work with the Information Assurance Team, Security Managers and Government ISSM to ensure any Data Spills are handled appropriately. Manage the Data Spill Process, working with external agencies as required to ensure cleanup and mitigation is accomplished within required times as set out by government.
  • Provides guidance and work leadership to less experienced technical staff members.
  • Maintains current knowledge of relevant technology as assigned.
  • Participates in special projects as required.
  • Provide incident detection through understanding malware and how to defend and mitigate infections. Triage malware, extracting relevant host and network-based indicators from malware samples.

Required Qualifications:

  • 5+ years of experience required.
  • Must be able to obtain and maintain a SECRET clearance.
  • BA/BS degree – may substitute additional years of experience.
  • Comprehensive knowledge of data security administration principles, methods, and techniques.
  • Must meet DOD 8140.03 requirement for intermediate level work role as a Cyber Defense Incident Responder
  • Requires familiarity with System & Network concepts, user authentication, and use of Cyber Stacks.
  • Requires understanding of DHS/DoD policies and procedures, including NIST 800-53, CJCSM 6510.01B and other applicable policies.

Preferred Qualifications:

  • Security Operations Center (SOC) Experience.
  • ESS (HBSS) Proficiency.
  • ACAS Proficiency.
  • CISCO Firewall data interpretation.
  • SPLUNK & SYSLOG data normalization.
  • The ability to work and set priorities on multiple projects/tasks at once and operate in a dynamic, fast-paced team-oriented environment.
  • The work is typically performed in an office environment, which requires normal safety precautions; work may require some physical effort in the handling of light materials, boxes, or equipment.
  • Depending on job assignment, additional specific certifications may be required.

Work Requirements

Years of Experience

5 + years of related experience

* may vary based on technical training, certification(s), or degree

Certification

Travel Required

Less than 10%

Citizenship

U.S. Citizenship Required

Job Tags

Work at office,

Similar Jobs

Goodwill Industries of Hawaii

Warehouse Store Manager Job at Goodwill Industries of Hawaii

 ...Job Description Job Description Goodwill Industries of Hawaii, Inc. Job Title: Warehouse Store Manager At Goodwill, we do more than provide jobs we create pathways to opportunity and dignity through the power of work. Our mission-driven culture sets us apart... 

TEKsystems

Title Clerk Job at TEKsystems

 ...Job Description Job Description &##128450; Title Clerk Location: Carmel, IN 46032 (on-site) Schedule: MondayFriday, between 8:00am7:00pm Start Date: November 17, 2025&##128736; Key Responsibilities Process up to 2,500 vehicle titles daily Match... 

Effizotech

Profee Psychiatry Medical Coder - National Remote - Remote No Degree UnitedHealthcare Group Job at Effizotech

 ...together.Under direction of the Coding Manager, the primary...  ...knowledge of anatomy, physiology and medical terminology as well as...  ...modifiers. Additionally, the Medical Coder serves as the key resource to...  ...annually3+ years of experience in Professional Services Psychiatry... 

BairesDev

Social Media Manager - Remote Work Job at BairesDev

Join to apply for the Social Media Manager - Remote Work role at BairesDevJoin to apply for the Social Media Manager - Remote Work role at BairesDev...  ...ChatGPT, Claude, Gemini, etc.What we offer:- Work-from-home hardware setup- PTO, parental leave, and other special leaves... 

Tryfacta, Inc.

Web Content Specialist Job at Tryfacta, Inc.

 ...Hybrid Web Content Specialist Location: Oakland, CA 94606 Durations : Long Term Contract Position/work hrs.: Hybrid, 1-day per week in-person Were seeking a detail-oriented Web Content Specialist to maintain and improve our websites. This role involves updating...