Aerial CSOC Analyst

General Dynamics Information Technology
3dRemote

About The Position

Seize your opportunity to make a personal impact as an Aerial CSOC Analyst supporting the United States Postal Service. GDIT is your place to make meaningful contributions to challenging projects and grow a rewarding career. At GDIT, people are our differentiators. As an Aerial CSOC Analyst, you will help ensure today is safe and tomorrow is smarter. Our work depends on an Aerial CSOC Analyst Aerial joining our team to analyze design, develop, implement, and support code for our government customer, the United States Postal Service. HOW AN AERIAL CSOC ANALYST WILL MAKE AN IMPACT In this role, a typical day will include: Performing deep-dive incident analysis by correlating data from various sources and determines if a critical system or data set affected. Handle incidents as defined in Playbooks and SOPs. Advise on remediation actions and provide input and analysis on how to leverage Artificial Intelligence, Machine Learning, and SOAR capabilities to improve CSOC efficiency and accuracy. Identification of Cybersecurity problems which may require mitigating controls Analyze network traffic to identify exploit or intrusion related attempts Recommend detection mechanisms for exploit and or intrusion related attempts Provide subject matter expertise on network-based attacks, network traffic analysis, and intrusion methodologies Escalate items which require further investigation to other members of the Threat Management team Execute operational processes in support of response efforts to identified security incidents Utilize AI/ML-based tools and techniques to detect anomalies, automate incident triage, and improve threat intelligence Performing and analyzing threat intelligence to assess risk and adapt defenses using ML enhance tools Manage email security using ProofPoint, monitor for threats, and promptly respond to attacks Configure Splunk for log analysis, create alerts, and investigate security incidents diligently Set up FirePower for network monitoring, analyze traffic patterns, and enforce robust security measures Deploy Sentinel 1 agents efficiently, monitor alerts closely, and conduct thorough security assessments Monitoring, reviewing, and responding to security alerts and incidents across multiple platforms including Microsoft Defender for Cloud Apps, Defender for Endpoint, Defender XDR, Defender for Office 365, Azure Entra ID, and Google Cloud Security Command Center (SCC) Tuning security policies, maintaining visibility into cloud and endpoint environments, and supporting continuous improvement of the organization’s security posture Stay current on the latest cybersecurity trends, threat actors, and AI/ML research relevant to the field Identify and support automation use cases, including the use of AI/ML to enhance SOC capabilities. Collaborate across Operations to provide SOC enhancement capabilities through the use of automation and AI.

Requirements

  • BA or BS in Computer Science, Information Technology, or related field
  • 3+ years IT security experience with at least some exposure to AI/ML projects
  • 2+ years’ experience in network traffic analysis
  • Strong working knowledge of: Boolean Logic TCP/IP Fundamentals Network Level Exploits Threat Management
  • Knowledge of Control Frameworks and Risk Management techniques
  • Excellent oral, written communication skills and excellent interpersonal and organizational skills
  • Strong understanding of IDS/IPS technologies, trends, vendors, processes, and methodologies
  • Strong understanding of common IDS/IPS architectures and implementations
  • Strong understanding of IDS/IPS signatures, content creation and signature characteristics including both signature and anomaly-based analysis and detection
  • Experience with cloud security (AWS, Azure, GCP)
  • Hands-on experience with cybersecurity automation (e.g., SOAR platforms).
  • Proficiency in using machine learning frameworks to develop, train, and deploy models for anomaly detection, threat intelligence, and behavioral analysis in cybersecurity contexts.
  • Skills in data analysis and feature engineering, with the ability to preprocess and transform large datasets from various sources (e.g., logs, network traffic) to extract relevant features for machine learning models aimed at identifying security incidents and vulnerabilities.
  • Familiarity with the application of AI/ML techniques in cybersecurity, including but not limited to automated threat detection, incident response automation, and predictive analytics.
  • Experience in evaluating the effectiveness of AI/ML solutions in a SOC environment is a plus.
  • Understanding and experience identifying and implementing automation use cases.
  • Ability to obtain and maintain a Public Trust clearance and successfully pass a thorough Government background screening process requiring the completion of detailed forms and fingerprinting
  • This position has a U.S. residency requirement. The USPS security clearance process requires the selected candidate to have resided in the U.S. (including U.S. Territories) for the last five years as follows: U.S. Citizens cannot have left the U.S. (including U.S. Territories) for longer than 6 months consecutively in the last 3 years (unless they meet certain exceptions). Non-U.S. Citizens cannot have left the U.S. (including U.S. Territories) for longer than 90 days consecutively in the last 3 years.

Nice To Haves

  • One or more relevant certifications such as GIAC Certified Enterprise Defender (GCED), GIAC Certified Security Essentials (GSEC), CISSP, or SSCP desired

Responsibilities

  • Performing deep-dive incident analysis by correlating data from various sources and determines if a critical system or data set affected.
  • Handle incidents as defined in Playbooks and SOPs.
  • Advise on remediation actions and provide input and analysis on how to leverage Artificial Intelligence, Machine Learning, and SOAR capabilities to improve CSOC efficiency and accuracy.
  • Identification of Cybersecurity problems which may require mitigating controls
  • Analyze network traffic to identify exploit or intrusion related attempts
  • Recommend detection mechanisms for exploit and or intrusion related attempts
  • Provide subject matter expertise on network-based attacks, network traffic analysis, and intrusion methodologies
  • Escalate items which require further investigation to other members of the Threat Management team
  • Execute operational processes in support of response efforts to identified security incidents
  • Utilize AI/ML-based tools and techniques to detect anomalies, automate incident triage, and improve threat intelligence
  • Performing and analyzing threat intelligence to assess risk and adapt defenses using ML enhance tools
  • Manage email security using ProofPoint, monitor for threats, and promptly respond to attacks
  • Configure Splunk for log analysis, create alerts, and investigate security incidents diligently
  • Set up FirePower for network monitoring, analyze traffic patterns, and enforce robust security measures
  • Deploy Sentinel 1 agents efficiently, monitor alerts closely, and conduct thorough security assessments
  • Monitoring, reviewing, and responding to security alerts and incidents across multiple platforms including Microsoft Defender for Cloud Apps, Defender for Endpoint, Defender XDR, Defender for Office 365, Azure Entra ID, and Google Cloud Security Command Center (SCC)
  • Tuning security policies, maintaining visibility into cloud and endpoint environments, and supporting continuous improvement of the organization’s security posture
  • Stay current on the latest cybersecurity trends, threat actors, and AI/ML research relevant to the field
  • Identify and support automation use cases, including the use of AI/ML to enhance SOC capabilities.
  • Collaborate across Operations to provide SOC enhancement capabilities through the use of automation and AI.

Benefits

  • 401K with company match
  • Comprehensive health and wellness packages
  • Internal mobility team dedicated to helping you own your career.
  • Professional growth opportunities including paid education and certifications.
  • Cutting-edge technology you can learn from
  • Rest and recharge with paid vacation and holidays
  • Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match.
  • To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave.
  • GDIT typically provides new employees with 15 days of paid leave per calendar year to be used for vacations, personal business, and illness and an additional 10 paid holidays per year. Paid leave and paid holidays are prorated based on the employee’s date of hire.
  • The GDIT Paid Family Leave program provides a total of up to 160 hours of paid leave in a rolling 12 month period for eligible employees.
  • To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available.
  • We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service