Advance your career while impacting our national security in cyber as a Cybersecurity Analyst Sr Principal at GDIT. Here, technologists have many paths to grow a meaningful career supporting cyber missions and operations across the federal government. MEANINGFUL WORK AND PERSONAL IMPACT As a Technical Compliance Cybersecurity Specialist, the work you’ll do at GDIT will be impactful to the mission of DLA Troop Support Medical Supply Chain. In this role, one serves as the technical authority for validating audit readiness across multiple technology domains, including identity, databases, hosting environments, application platforms, and infrastructure components. This role bridges the gap between auditors and engineering teams by translating audit control requirements into concrete technical checks and independently verifying compliance. The individual will produce audit-ready evidence, identify gaps, lead remediation planning, and reduce the operational burden placed on subject matter experts. This position is hands-on, investigative, and deeply technical, with the ability to interpret controls and directly inspect systems, logs, configurations, and code paths to determine whether requirements are actually met. This position requires analytical and communication skills to evaluate existing audit materials, understand requirement rationales through strategic questioning, and collaborate with teams to produce targeted audit deliverables, Lead/Manage/Support - Interpret audit controls from financial, security, and enterprise compliance frameworks. Map each control to the real technical mechanisms used across identity systems, databases, hosting environments, and application components. Produce authoritative guidance describing how controls are satisfied, citing actual system behavior and configuration Collaborate with Application Infrastructure, ICAM, Database, and Application teams to research findings. Participate in design reviews to ensure future changes remain audit-aligned Drive hands-on validation across multiple domains. Independently validate technical compliance for: Identity & access management (OIDC/OAuth, ABAC, E-ICAM). Databases (Oracle, SQL Server) Infrastructure and hosting (IIS, Linux, Windows Server) Application behavior (session management, authentication flows) Logging, audit trails, and monitoring Utilize: Identity systems (OIDC/OAuth, IdPs, ABAC, ICAM concepts). Databases (Oracle, SQL Server — configuration, permissions, logging, auditing). Hosting platforms (IIS, Windows Server, Linux). Application architectures (authentication flows, API patterns, session handling). Infrastructure components (load balancers, proxies, certificates, network basics).
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Senior
Education Level
High school or GED
Number of Employees
5,001-10,000 employees