Cyber Security Forensics Auditor, Insider Threat, TS/SCI
When it comes to Cyber, GDIT is looking for people with enthusiasm, curiosity, and a thirst for knowledge. Are you the person with the passion, intellect, and skills to learn the procedures and tools to become a great Cyber Analyst? We are looking for people with a different kind of mind-set that includes strong intuition and the ability to think creatively and see the bigger picture while paying attention to the details. We are looking for people with the ability to learn new concepts and introduce new ideas that propel GDIT to the next level of cyber operational efficiency and help our customers reduce their exposure to cyber threats. We are looking for people with the ability to perform the procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. We need Cyber Analysts that can do all or most of these types of tasks using various Cyber Security Tools to provide 24x7 computer network security auditing and Fraud, Waste and Abuse detection on multiple networks and systems for our government agency customer:
- Process requests for data discovery using digital forensics practices to ensure data integrity.Provide investigative support for fraud, waste and abuse, including content inappropriate to the workplace, Illegal Activity, Productivity Loss and Non-Compliant Activity and provide support to Threat Mitigation Cell, Law Enforcement, General Counsel, Inspector General, customer privacy Office, and the customer Operations Security (OPSEC) Office through investigative research, forensic examination, internet monitoring and formal reporting.Complete requests in compliance to the Freedom of Information Act, including email exports and network data pulls.Comprehensive monitoring of cyber tools, reviewing system and application logs, intrusion detection alerts for indication unauthorized activity, insider threat, or criminal behavior punishable by law, code or statue.Make administrative changes via Active Directory when requested.Produce case evidence and reports.Work on special projects as assigned.Desire candidates with experience using cyber tools such as: Splunk, EnCase, Forensic Toolkit, Fidelis, and Proofpoint. Experience with operating systems and databases a plus.Maintains current knowledge of relevant technology as assigned.
- Must have both DoD 8570 IAT II and CND-SP Auditor certifications.
- Requires TS/SCI
- Must be willing to obtain and maintain a CI Polygraph.