Seize your opportunity to make a personal impact as an Aerial CSOC Analyst supporting the United States Postal Service. GDIT is your place to make meaningful contributions to challenging projects and grow a rewarding career. At GDIT, people are our differentiators. As an Aerial CSOC Analyst, you will help ensure today is safe and tomorrow is smarter. Our work depends on an Aerial CSOC Analyst Aerial joining our team to analyze design, develop, implement, and support code for our government customer, the United States Postal Service. HOW AN AERIAL CSOC ANALYST WILL MAKE AN IMPACT In this role, a typical day will include: Performing deep-dive incident analysis by correlating data from various sources and determines if a critical system or data set affected. Handle incidents as defined in Playbooks and SOPs. Advise on remediation actions and provide input and analysis on how to leverage Artificial Intelligence, Machine Learning, and SOAR capabilities to improve CSOC efficiency and accuracy. Identification of Cybersecurity problems which may require mitigating controls Analyze network traffic to identify exploit or intrusion related attempts Recommend detection mechanisms for exploit and or intrusion related attempts Provide subject matter expertise on network-based attacks, network traffic analysis, and intrusion methodologies Escalate items which require further investigation to other members of the Threat Management team Execute operational processes in support of response efforts to identified security incidents Utilize AI/ML-based tools and techniques to detect anomalies, automate incident triage, and improve threat intelligence Performing and analyzing threat intelligence to assess risk and adapt defenses using ML enhance tools Manage email security using ProofPoint, monitor for threats, and promptly respond to attacks Configure Splunk for log analysis, create alerts, and investigate security incidents diligently Set up FirePower for network monitoring, analyze traffic patterns, and enforce robust security measures Deploy Sentinel 1 agents efficiently, monitor alerts closely, and conduct thorough security assessments Monitoring, reviewing, and responding to security alerts and incidents across multiple platforms including Microsoft Defender for Cloud Apps, Defender for Endpoint, Defender XDR, Defender for Office 365, Azure Entra ID, and Google Cloud Security Command Center (SCC) Tuning security policies, maintaining visibility into cloud and endpoint environments, and supporting continuous improvement of the organization’s security posture Stay current on the latest cybersecurity trends, threat actors, and AI/ML research relevant to the field Identify and support automation use cases, including the use of AI/ML to enhance SOC capabilities. Collaborate across Operations to provide SOC enhancement capabilities through the use of automation and AI.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level