Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Incident Response Analyst, TS/SCI Active Polygraph image - Rise Careers
Job details

Incident Response Analyst, TS/SCI Active Polygraph

Incident Response Analyst, TS/SCI Active PolygraphUSA VA McLean - Customer Proprietary (VAC393)General Dynamics Information TechnologyDelivering consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community.We are GDIT. We support and secure some of the most complex government, defense, and intelligence projects across the country. At GDIT, cyber security is not just a singular part of our mission—it connects every one of us because it’s embedded into every aspect of what we do.Our work depends on an Incident Response Analyst joining our team to support ODNI Customer activities at McLean, VA. In this role, a typical day will include:• Collect intrusion artifacts (e.g., source code, malware, trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.• Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents.• Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat conditions and determine which security issues may have an impact on the enterprise.• Perform cyber defense trend analysis and reporting.• Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems.• Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.• Write and publish after-action reviews.• Write and publish cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies.WHAT YOU’LL NEED:• Current TS/SCI clearance with polygraph• BA/BS degree or equivalent work experience• 8+ years of relevant work experience• Must meet Department of Defense (DOD) 8570.01-M baseline certification requirement for Information Assurances Technical (IAT) Level III CASP+CE, CCNP Security, CISA, or CISSP or Associate, GCED, GCIH, or CCSP.• Minimum of 3 year experience Computer Forensic Analyst and or Computer Network Defense CND Forensic Analyst• Skill in conducting vulnerability scans and recognizing vulnerability in security systems (e.g., Cloud Environments) AWS, Google, IBM, Azure, and Oracle.• Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions.• Knowledge of cyber defense and information security policies, procedures, and regulations.• Knowledge of incident response and handling methodologies.• Skill in performing damage assessments.• Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).• Knowledge of OSI model and underlying network protocols (e.g., TCP/IP).• Knowledge of cloud service models and how those models can limit incident response.• Knowledge of system administration, network, and operating system hardening techniques.• Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).• Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state-sponsored, and nation sponsored).Type of Requisition: RegularClearance Level Must Currently Possess: Top Secret SCI + PolygraphJob Family: Cyber SecurityUS Citizenship Required: YesThe likely salary range for this position is $140,908 - $190,640. This is not a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.Scheduled Weekly Hours: 40Travel Required: Less than 10%Telecommuting Options: OnsiteWork Location: USA VA McLeanGDIT is an Equal Opportunity/Affirmative Action employer.
General Dynamics Information Technology Glassdoor Company Review
3.9 Glassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon Glassdoor star icon
General Dynamics Information Technology DE&I Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
CEO of General Dynamics Information Technology
General Dynamics Information Technology CEO photo
Amy Gilliland
Approve of CEO

Average salary estimate

$165774 / YEARLY (est.)
min
max
$140908K
$190640K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Incident Response Analyst, TS/SCI Active Polygraph, General Dynamics Information Technology

Are you passionate about cybersecurity and ready to take on the challenges of protecting crucial government information? As an Incident Response Analyst at General Dynamics Information Technology in Greendale, WI, you will be an integral part of our mission to secure the most complex government and defense projects across the country. In this role, you'll be diving deep into the world of cyber defense, collecting intrusion artifacts and collaborating with a skilled team to resolve cyber incidents. Your day will be a mix of monitoring external data sources for the latest threat conditions, performing trend analysis, and writing detailed reports that guide the organization in maintaining robust cybersecurity practices. With a TS/SCI Active Polygraph clearance, you'll engage in forensically sound collection of data while assessing potential vulnerabilities in systems, particularly focusing on cloud environments like AWS and Azure. If you have a wealth of experience, especially in computer forensics and vulnerability recognition, and you're looking to make an impactful contribution to national security, this position might be the perfect fit for you. Join GDIT and be part of a dedicated team that is revolutionizing cybersecurity and building a safer future for our nation.

Frequently Asked Questions (FAQs) for Incident Response Analyst, TS/SCI Active Polygraph Role at General Dynamics Information Technology
What are the primary responsibilities of an Incident Response Analyst at General Dynamics Information Technology?

As an Incident Response Analyst at General Dynamics Information Technology, your core responsibilities will include collecting and analyzing intrusion artifacts, providing technical support to ensure the resolution of cyber defense incidents, and performing damage assessments. You will actively monitor various data sources to stay abreast of the latest cyber threats and produce reports and reviews that inform the organization about mitigation techniques.

Join Rise to see the full answer
What qualifications are needed for the Incident Response Analyst position at General Dynamics Information Technology?

To qualify for the Incident Response Analyst position at General Dynamics Information Technology, applicants must hold a current TS/SCI clearance with a polygraph, possess a BA/BS degree or equivalent experience, and have at least 8 years of relevant work experience. Additionally, candidates must meet Department of Defense certification requirements and demonstrate expertise in incident response and computer network defense.

Join Rise to see the full answer
How does General Dynamics Information Technology support professional development for Incident Response Analysts?

General Dynamics Information Technology is committed to the professional development of its employees, including Incident Response Analysts. The company offers various training programs, certification opportunities, and resources to help you stay updated on the latest trends and technologies in cybersecurity, ensuring that you grow your skills and career within the organization.

Join Rise to see the full answer
What tools and technologies will I work with as an Incident Response Analyst at General Dynamics Information Technology?

In the role of Incident Response Analyst at General Dynamics Information Technology, you will work with various tools and technologies related to cybersecurity. This includes vulnerability scanning tools, intrusion detection systems, as well as cloud platforms like AWS and Azure, ensuring you are exposed to the latest in cyber defense technologies.

Join Rise to see the full answer
What salary range can I expect for the Incident Response Analyst role at General Dynamics Information Technology?

For the Incident Response Analyst position at General Dynamics Information Technology, the likely salary range is between $140,908 and $190,640. However, actual compensation may vary based on experience, location, and specific contractual requirements.

Join Rise to see the full answer
Common Interview Questions for Incident Response Analyst, TS/SCI Active Polygraph
Can you explain your experience with incident response and how it applies to the role at General Dynamics Information Technology?

When discussing your experience with incident response, emphasize specific incidents you managed, the strategies you implemented, and the outcomes you achieved. Highlight how your background aligns with the responsibilities outlined in the job description, showcasing your skills in mitigating cybersecurity threats.

Join Rise to see the full answer
What methodologies do you use for collecting intrusion artifacts?

In responding to this question, outline the methodologies you have employed in previous roles, including any forensic tools and techniques you utilized. It's important to show a sound understanding of both the technical aspects of the role and best practices in evidence collection.

Join Rise to see the full answer
How do you stay updated on the latest cybersecurity threats and trends?

A great approach here is to describe the resources you utilize, such as industry publications, threat intelligence feeds, and forums. Your ability to remain informed will demonstrate to interviewers your commitment to intelligence in your field.

Join Rise to see the full answer
Describe a time when you had to coordinate with other teams on a cybersecurity incident. How did you manage communication?

The STAR method (Situation, Task, Action, Result) is effective when answering this question. Share a specific example where you worked alongside other teams, detailing your role in facilitating clear communication, aligning objectives, and resolving the issue collaboratively.

Join Rise to see the full answer
What is your approach to performing a damage assessment after a security incident?

When answering this, detail your step-by-step procedure for assessing damage, including collection of data and logs, evaluation of network impact, and how you document findings. Mentioning the tools used will also illustrate your technical proficiency.

Join Rise to see the full answer
Can you give an example of a complex cyber incident you handled?

In sharing an example, focus on the complexity of the incident, your specific role, and the steps you took to address the situation. Stress your problem-solving skills and how your actions contributed to the overall resolution of the incident.

Join Rise to see the full answer
What are your views on cloud security and how it affects incident response?

Discuss the unique challenges cloud environments pose in terms of incident response, including shared responsibility models and potential vulnerabilities. Share any personal experiences or strategies you have developed in managing such environments.

Join Rise to see the full answer
How do you prioritize incidents when multiple alerts are triggered?

Your response should include criteria you use to prioritize incidents, such as severity level, potential impact, and unique characteristics of the threat. Illustrating your analytical skills and decision-making process will be essential here.

Join Rise to see the full answer
What certifications do you hold that are relevant to the Incident Response Analyst position?

Be prepared to discuss relevant certifications in detail. Explain how these certifications have equipped you with the necessary skills and knowledge for the Incident Response Analyst role, supporting your qualifications and commitment to ongoing professional development.

Join Rise to see the full answer
How do you handle stress and pressure during a cyber incident?

Share your stress management techniques, such as staying organized, communicating effectively, and maintaining focus during critical situations. Providing a specific example of a high-pressure incident and how you managed it will illustrate your skills effectively.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Inclusive & Diverse
Rise from Within
Mission Driven
Diversity of Opinions
Work/Life Harmony
Transparent & Candid
Growth & Learning
Fast-Paced
Collaboration over Competition
Take Risks
Friends Outside of Work
Passion for Exploration
Customer-Centric
Reward & Recognition
Feedback Forward
Rapid Growth
Medical Insurance
Paid Time-Off
Maternity Leave
Mental Health Resources
Equity
Paternity Leave
Fully Distributed
Flex-Friendly
Some Meals Provided
Snacks
Social Gatherings
Pet Friendly
Company Retreats
Dental Insurance
Life insurance
Health Savings Account (HSA)
Photo of the Rise User
Posted 8 days ago
Photo of the Rise User
Privia Health Remote Remote, USA, United States
Posted 4 days ago
Photo of the Rise User
Posted 10 days ago
Photo of the Rise User
Customer-Centric
Startup Mindset
Collaboration over Competition
Family Medical Leave
Maternity Leave
Paternity Leave
Flex-Friendly
Social Gatherings
Pet Friendly
Fitness Stipend
Medical Insurance
Dental Insurance
Vision Insurance
Life insurance
Disability Insurance
Learning & Development
Bias Training
Equity
Employee Resource Groups
Unlimited Vacation
Paid Time-Off
Photo of the Rise User
Inclusive & Diverse
Mission Driven
Social Impact Driven
Passion for Exploration
Dare to be Different
Diversity of Opinions
Reward & Recognition
Empathetic
Feedback Forward
Work/Life Harmony
Collaboration over Competition
Growth & Learning
Transparent & Candid
Customer-Centric
Rise from Within
Friends Outside of Work
Medical Insurance
Dental Insurance
Vision Insurance
Mental Health Resources
Life insurance
Disability Insurance
Health Savings Account (HSA)
Flexible Spending Account (FSA)
Learning & Development
Work Visa Sponsorship
Employee Resource Groups
401K Matching
Paid Time-Off
Maternity Leave
Social Gatherings
Company Retreats

At GDIT, we deliver the resources, solutions, and experience at the most critical moments of change. 50 years of experience. 30,000 everyday heroes.

239 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
December 23, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!