Cyber Security Analyst Advisor Own your career as a Cyber Security Analyst Advisor at GDIT. Here, you'll have the opportunity to build strong lines of cyber defense using cutting-edge technologies. Your work in cyber security at GDIT will have an impact on securing our clients' missions and ensuring we anticipate the threats of tomorrow. At GDIT, people are our differentiator. As a Cyber Security Analyst Advisor you will help ensure today is safe and tomorrow is smarter. Our work depends on Cyber Security Analyst Advisor joining our team to proactively discover and manage threats and vulnerabilities that put the Agency at risk. They are responsible for the collection, processing, and dissemination of cyber threat intelligence for Government leadership and security stakeholders. The analyst will be expected to produce documents, present briefings, and provide recommendations to a wide range of audiences; including both technical and non-technical stakeholders.
• Collect cyber threat information from multiple sources and disciplines, including but not limited to Government agencies in the Intelligence Community and open-source channels.
• Process and analyze collected information to identify threats and vulnerabilities that could impact the environment.
• Monitor open-source channels to identify and report hostile actions targeting the Agency.
• Track and utilize attacker IOCs and TTPs to identify patterns of adversary activity over time.
• Produce intelligence products (written, verbal) for Government leadership and security stakeholders.
• Collaborate with internal and external cyber intelligence groups.
• Conduct asset identification, network discovery, and software inventory.
• Embrace a culture of continuous service improvement and service excellence.
• Stay up to date on security industry trends, threats, vulnerabilities, and APT activity.
• Provide risk assessments and develop reporting for Government leadership.
• Create and maintain SOPs and workflows related to cyber threat intelligence functions and operational requirements.
• Strong experience analyzing various log formats such as those from endpoints, networking devices, and authentication services.
• Experience with analyzing raw packet capture.
• Scripting capabilities (Python, PowerShell, Bash, Shell).
• Understanding of how to collect IOCs and utilize them to identify intrusions.
• Extensive knowledge of current and past malware, attack methodologies, and adversaries.
• Knowledge of incident response methodologies and technologies.
• Experience applying frameworks such as the Cyber Kill Chain, Diamond Model and MITRE ATT&CK.
• Understanding of current industry trends and emerging threats.
• Strong oral, written, and presentation abilities.
• Master's Degree in Computer Science or related technical field.
• Holds an intermediate level, industry recognized, certification (GCIA/GCIH/GCFA/GNFA/GCTI/GREM)
• Previous experience in a threat intelligence role.
• Experience in intelligence collection, analysis, and creation of products.
• Experience working with a Threat Intelligence Platform (MISP, Anomali, X-Force, etc)
• Deep knowledge related to the functionality of Windows OS, Mac OS-X, and Linux Operating systems and associated file systems (NTFS, HFS, ext, exFAT, etc)
• Strong scripting capabilities (Python, PowerShell, Bash, Shell). WHAT YOU'LL NEED TO SUCCEED: Education: Bachelor's Degree in Computer Science, or related technical field. Required Experience: 5 years' progressive work experience within Information Security: At least 2 years' experience in a threat hunting, intrusion detection or threat intelligence role. At least 2 years' experience with technical writing and developing technical documents. Required Technical Skills:
• Strong experience analyzing various log formats such as those from endpoints, networking devices, and authentication services.
• Experience with analyzing raw packet capture.
• Scripting capabilities (Python, PowerShell, Bash, Shell).
• Understanding of how to collect IOCs and utilize them to identify intrusions.
• Extensive knowledge of current and past malware, attack methodologies, and adversaries.
• Knowledge of incident response methodologies and technologies.
• Experience applying frameworks such as the Cyber Kill Chain, Diamond Model and MITRE ATT&CK.
• Understanding of current industry trends and emerging threats. Security Clearance Level: TS/SCI Preferred Skills:
• Master's Degree in Computer Science or related technical field.
• Holds an intermediate level, industry recognized, certification (GCIA/GCIH/GCFA/GNFA/GCTI/GREM)
• Previous experience in a threat intelligence role.
• Experience in intelligence collection, analysis, and creation of products.
• Experience working with a Threat Intelligence Platform (MISP, Anomali, X-Force, etc)
• Deep knowledge related to the functionality of Windows OS, Mac OS-X, and Linux Operating systems and associated file systems (NTFS, HFS, ext, exFAT, etc)
• Strong scripting capabilities (Python, PowerShell, Bash, Shell). Location: On Customer Site Work Requirements
Date Posted: 10 April 2025
Apply for this Job