Seize your opportunity to make a personal impact as a Cyber Threat Analyst supporting the United States Postal Service. GDIT is your place to make meaningful contributions to challenging projects and grow a rewarding career. At GDIT, people are our differentiators. As a Cyber Threat Analyst, you will help ensure today is safe and tomorrow is smarter. Our work depends on a Cyber Threat Analyst joining our team to analyze design, develop, implement, and support code for our government customer, the United States Postal Service. HOW A CYBER THREAT ANALYST WILL MAKE AN IMPACT In this role, a typical day will include: Responsible for performing triage on all security escalations and detections to determine scope, severity, and root cause. Monitor cyber security events, detecting incidents, and investigating incidents. Identify, recommend strategies, develop, and implement automation use cases leveraging AI/ML capabilities. Support deploying, configuring, testing, and maintaining Security Orchestration, Automation, and Response (SOAR) platform, and tools integrated with AI/ML capabilities to enhance threat detection, analysis and response. Provide support to contract Program Manager, as necessary. Effectively communicates technical information to non-technical audiences. Influence others to comply with policies and conform to standards and best practices. Investigates and analyzes potential online threats to an organization's computer systems and networks. Monitor for malicious activity, assess vulnerabilities, and develop strategies to mitigate risks. Essentially, they act as a proactive defense mechanism against cyberattacks. WHAT YOU’LL NEED TO SUCCEED: Education: Bachelor's or Master's degree in Computer Science, Information Systems, Cybersecurity or other related fields. Or equivalent work experience. NOTE: If resources do not have a relevant college degree, an additional 4 years of relevant work experience is required. Required Experience: 7+ years of experience with security operations, threat hunting, and incident response Experience in analyzing alerts from Cloud, SIEM, EDR, and XDR tools, and alerts tuning process with preference on SentinelOne, Armis, and Splunk. Experience in configuring network devices and analyzing network traffic Experience with Artificial Intelligence and Machine Learning (AI/ML) based security tools. Experience in researching, developing, and implementing SOAR use cases. Familiar with Security Orchestration, Automation, and Response (SOAR) platform Familiarity with cybersecurity operation center functions. Experience configuring and re-configuring security tools, including SentinelOne and Splunk. Experience implementing Security frameworks, such as MITRE ATT&CK and NIST, and can interpret use cases into actionable monitoring solutions. Develop, test and Implement dynamic Risk-Based Alerting (RBA) Identifying and developing RBA and identifying use cases for SOAR and AI/ML. Monitor and analyze alerts from various sources such as IDS/IPS, Splunk, Tanium, MS Defender, SentinelOne and Cloud security tools leveraging SOAR and AI/ML capabilities, and provide recommendation for further tuning of these alerts when necessary. Analyze network traffic utilizing available tools and provide recommendations Perform vulnerability assessments of recently discovered CVEs against USPS systems and network. Assist in the process of configuring or re-configuring the security tools. Perform analysis on hosts running on a variety of platforms and operating systems, to include, but not limited to, Microsoft Windows, UNIX, Linux, as well as embedded systems and mainframes. Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave. Test, evaluate, and verify hardware and/or software to determine compliance with defined specifications and requirements MUST have one or more of the following Certification(s): CISSP, CISA, CISM, GIAC, RHCE. Security Clearance Level: Ability to obtain and maintain a Public Trust clearance and successfully pass a thorough Government background screening process requiring the completion of detailed forms and fingerprinting This position has a U.S. residency requirement. The USPS security clearance process requires the selected candidate to have resided in the U.S. (including U.S. Territories) for the last five years as follows: U.S. Citizens cannot have left the U.S. (including U.S. Territories) for longer than 6 months consecutively in the last 3 years (unless they meet certain exceptions). Non-U.S. Citizens cannot have left the U.S. (including U.S. Territories) for longer than 90 days consecutively in the last 3 years. Location: Remote GDIT IS YOUR PLACE: 401K with company match Comprehensive health and wellness packages Internal mobility team dedicated to helping you own your career. Professional growth opportunities including paid education and certifications. Cutting-edge technology you can learn from Rest and recharge with paid vacation and holidays #zxc726 #CyberThreatAnalyst The likely salary range for this position is $111,155 - $150,385. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Number of Employees
5,001-10,000 employees