Cybersecurity Analyst Sr Principal

General Dynamics Information Technology
1dHybrid

About The Position

Advance your career while impacting our national security in cyber as a Cybersecurity Analyst Sr Principal at GDIT. Here, technologists have many paths to grow a meaningful career supporting cyber missions and operations across the federal government. MEANINGFUL WORK AND PERSONAL IMPACT As a Technical Compliance Cybersecurity Specialist, the work you’ll do at GDIT will be impactful to the mission of DLA Troop Support Medical Supply Chain. In this role, one serves as the technical authority for validating audit readiness across multiple technology domains, including identity, databases, hosting environments, application platforms, and infrastructure components. This role bridges the gap between auditors and engineering teams by translating audit control requirements into concrete technical checks and independently verifying compliance. The individual will produce audit-ready evidence, identify gaps, lead remediation planning, and reduce the operational burden placed on subject matter experts. This position is hands-on, investigative, and deeply technical, with the ability to interpret controls and directly inspect systems, logs, configurations, and code paths to determine whether requirements are actually met. This position requires analytical and communication skills to evaluate existing audit materials, understand requirement rationales through strategic questioning, and collaborate with teams to produce targeted audit deliverables, Lead/Manage/Support - Interpret audit controls from financial, security, and enterprise compliance frameworks. Map each control to the real technical mechanisms used across identity systems, databases, hosting environments, and application components. Produce authoritative guidance describing how controls are satisfied, citing actual system behavior and configuration Collaborate with Application Infrastructure, ICAM, Database, and Application teams to research findings. Participate in design reviews to ensure future changes remain audit-aligned Drive hands-on validation across multiple domains. Independently validate technical compliance for: Identity & access management (OIDC/OAuth, ABAC, E-ICAM). Databases (Oracle, SQL Server) Infrastructure and hosting (IIS, Linux, Windows Server) Application behavior (session management, authentication flows) Logging, audit trails, and monitoring Utilize: Identity systems (OIDC/OAuth, IdPs, ABAC, ICAM concepts). Databases (Oracle, SQL Server — configuration, permissions, logging, auditing). Hosting platforms (IIS, Windows Server, Linux). Application architectures (authentication flows, API patterns, session handling). Infrastructure components (load balancers, proxies, certificates, network basics).

Requirements

  • Security clearance level: Minimum active Top Secret (SSBI or Tier 5) clearance
  • Education: High School Diploma (degree preferred)
  • Certifications: Must have ONE of the following: Certified Information Systems Auditor (CISA) Certified Information Systems Security Professional (CISSP) CompTIA Cybersecurity Analyst (CySA+)
  • Experience: 8+ years of related experience
  • Technical Skills: Identity systems (OIDC/OAuth, IdPs, ABAC, ICAM concepts). Databases (Oracle, SQL Server — configuration, permissions, logging, auditing). Hosting platforms (IIS, Windows Server, Linux). Application architectures (authentication flows, API patterns, session handling). Infrastructure components (load balancers, proxies, certificates, network basics).
  • Skills & Abilities: Experience interpreting and validating technical security and financial audit controls. Familiarity with DoD audit expectations, evidence requirements, and RFI workflows. Understanding of STIGs, RMF controls, and enterprise compliance frameworks. Ability to inspect configurations directly, run commands/queries, read logs, and trace system behavior. Strong diagnostic skills to independently assess compliance. Strong written communication for producing audit responses and evidence packages. Clear reasoning, assertive communication style, and comfort defending technical positions.

Responsibilities

  • Interpret audit controls from financial, security, and enterprise compliance frameworks.
  • Map each control to the real technical mechanisms used across identity systems, databases, hosting environments, and application components.
  • Produce authoritative guidance describing how controls are satisfied, citing actual system behavior and configuration
  • Collaborate with Application Infrastructure, ICAM, Database, and Application teams to research findings.
  • Participate in design reviews to ensure future changes remain audit-aligned
  • Drive hands-on validation across multiple domains.
  • Independently validate technical compliance for: Identity & access management (OIDC/OAuth, ABAC, E-ICAM).
  • Databases (Oracle, SQL Server)
  • Infrastructure and hosting (IIS, Linux, Windows Server)
  • Application behavior (session management, authentication flows)
  • Logging, audit trails, and monitoring

Benefits

  • Comprehensive benefits and wellness packages
  • 401K with company match
  • Competitive pay and paid time off
  • Full flex work weeks where possible
  • Variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave
  • Short and long-term disability benefits
  • Life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Senior

Education Level

High school or GED

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service