Live chat
General Dynamics Corporation

Sr Info Security Analyst TS SCI with Polygraph

General Dynamics Corporation - Aurora, CO

Job Description Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents. Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation. Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information. Evaluate firewall change requests and assess organizational risk. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems. Assists with implementation of counter-measures or mitigating controls. Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance. Prepares incident reports of analysis methodology and results. Provides guidance and work leadership to less-experienced technical staff members. Maintains current knowledge of relevant technology as assigned. Participates in special projects as required. Education Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience. Qualifications 5-8 years of related experience in data security administration. The CND Monitoring & Incident Response Analyst performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. She\/he receives data about and performs further analysis on incidents that are escalated from the CND Watch to include Suspicious Cyber Activity Reports (SCARS). Develops; refines; and performs advanced analysis techniques to uncover new or potential incidents. Analysis techniques may be refined into training and process improvements that are promulgated back to the CND Watch for sustained operations. Performs in-depth analysis techniques to uncover new or potential incidents.\u00a0 Performs in-depth analysis and recommends defensive and proactive measures to thwart potential and malicious activity or inappropriate use by any internal or external entity to include: conducting malicious code activity analysis; determining the effects on a system or the network; assisting in gathering potential evidence for law enforcement; etc. She\/he prepares incident reports of analysis methodology and results. Required Skills:The successful candidate must have excellent verbal and written communication skills and strong work ethic. He\/she must have several years' experience with and be able to analyze Intrusion Detection Systems (IDS) to identify security issues for remediation; evaluate firewall change requests and assess organizational risk; CND Incident Response Analyst and perform periodic and on-demand system audits and vulnerability assessments; including user accounts; application access; file system and external Web integrity scans to determine compliance. Cyber threat analyst involves a combination of: Advanced use of the forensic tools\/investigations Investigating the Advanced Persistant Threat (APT); Organized Crime Hackers and Hackivists Hacker\/Breach investigations; intrusion analysis; and advanced investigative strategies Advanced computer forensics methodology In-depth Windows FAT and exFAT file system examination In-depth Windows NTFS file system examination Remote and complex forensic acquisition\/analysis tactics Advanced memory acquisition and analysis Live response and volatile evidence collection System Restore points and Volume Shadow Copy Exploitation File System Timeline Analysis Super Timeline Analysis File System and data layer examination Metadata and file name layer examination File Sorting and hash comparison Advanced file recovery Discovering unknown malware on a host Recovering key Windows files Indicators of compromise development and usage Step-by-step methodologies to investigate intrusion cases. Must possess appropriate current DOD Information Assurance (IA) certification to be considered for employment; i.e., CompTIA Security CE, or CCNA-Security. CompTIA Security CE is the preferred certification. In addition must attain the required DOD 8570 Computing Environment (CE) certification within six (6) months of hire date. Due to the sensitive nature of the work performed for this government customer, candidates must be willing to submit to and pass a polygraph As part of your role\/function on the program, you will be granted privileged user access. Privileged Users are subject to greater scrutiny as a direct result of the significant responsibilities placed upon them. Please be aware that because of these critical duties, you will be subject to additional IT system monitoring, and supervisory evaluation to ensure continuous adherence to Privileged User processes and procedures. Privileged Users are subject to a zero tolerance policy for security violations. Because of the sensitive nature of the work being done for this government client, all candidates must hold a TS\/SCI with Polygraph.\u00a0 Benefits of this Position: Opportunity for Fast Growth within the program Professional Development Assistance \u2013 Covering the Cost of Obtaining Professional & Technical Certifications (depending on program) Educational Reimbursement \u2013 toward degree programs and individual coursework 401K Match \u2013 with 100% vesting on day one Health, Dental and Vision Coverage to keep you healthy, starting your first day We know work-life balance is important, GDIT offers Paid Time Off, Plus 10 Paid Holidays Parking and transit commuter benefits Why Work at General Dynamics IT? Work with top talent and some of the brightest minds in your field\u00a0 Support missions that make a difference to our Nation Become part of an organization that that is committed to the highest ethical standards in all that we do\u00a0 Thrive in the stability of a large organization, with the ability to move onto new opportunities, supporting different missions, building your career within GDIT Want to move, or find a job close to home? We have positions in several locations in the United States and the world Enjoy a culture that supports work-life balance General Dynamics is a\u00a0 Fortune Blue Ribbon Company \u00a0and\u00a0 Clearance Jobs Top 10 Government Contractor . #ISDCJ #DPOST #ZRPOST As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors. With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services. GDIT is an Equal Opportunity\/Affirmative Action Employer - Minorities\/Females\/Protected Veterans\/Individuals with Disabilities. Need help finding the right job? We can recommend jobs specifically for you! Click here to get started.

15 days 14 hours ago

General Dynamics Corporation

apply

Sr Info Security Analyst TS SCI with Polygraph General Dynamics Corporation - Aurora, CO, United States

   

Location: Aurora, CO

Company Profile:
General Dynamics is a market leader in business aviation; combat vehicles, weapons systems and munitions; shipbuilding and marine systems; and mission-critical information systems and technology. The company was formed in 1952 through the combination of the Electric Boat Company, Consolidated Vultee (CONVAIR) and several others. The company grew organically and through acquisitions until the early 1990s, when we sold many of our defense-related businesses. Starting in the mid-1990s, we began expanding by acquiring combat vehicle-related businesses, additional shipyards, information-technology product and service companies and Gulfstream Aerospace Corporation. Since then we have acquired and integrated more than 60 businesses, including six in 2011. Our revenue has grown from $4 billion to approximately $32 billion in that time and our workforce has increased from 29,000 to approximately 95,000 employees today.