Please take this opportunity to join one of GDIT’s fastest long-standing growing programs! US Battlefield Information Collection and Exploitation System eXtended (US BICES-X) is a cutting edge program supporting DoW intelligence information sharing on current and emerging global threats to mission and coalition partners and emerging nations. With an internationally dispersed team supporting each combatant command, the US BICES-X team is in direct support of the war fighter and their missions. We are seeking a creative and driven professional with a passion for solving real world issues on a cross-functional, fast paced team. As part of the Defensive Cyber Operations Team, you’ll be charged with maintaining the Cyber Security Posture for Enterprise data centers, workstations, and remote locations across the globe. Responsibilities: Performs Defensive Cyber Operations (DCO) activities (formally known as Cyber Network Defense) for a large Program; coordinates with government Program staff, USAF, and other government agencies to assist in the creation, dissemination, direction, and auditing of program policy, standards, and operating procedures. This position will be working within our Cybersecurity Infrastructure environment providing but not limited to; Implementation and Administration of Security Operations, SPLUNK, ACAS, ESS, CSfC Conmon and security related activities to secure and harden the cybersecurity systems. Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network in order to protect information, information systems, and networks from threats. Utilize available resources to conduct Cybersecurity activities, and report to senior GDIT and government personnel on overall program security posture Manages the CSfC Monitoring environment with in Splunk/Elastic to ensure Continuous Monitoring requirements as laid out by NSA are met. Ensures the SEIM is fully functioning, collecting logs from all hosts, syslogs from appliances and producing dashboards for analysis and log retention. Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices. Operates and Maintains the Endpoint Security Solution (ESS) based on Trellix ePO and all its associated point products. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance. Maintains current knowledge of relevant technology as assigned Provides guidance and work leadership to less-experienced technical staff members Participates in special projects as required.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level