F-35 Incident Response SOC Analyst | Active Secret clearance Job at General Dynamics Information Technology, Arlington, VA

M2xoTXc1a2pkeTN3Y1Vnc2Q5MjQ0RkkrSkE9PQ==
  • General Dynamics Information Technology
  • Arlington, VA

Job Description

Public Trust: None
Requisition Type: Regular
Your Impact

Own your opportunity to work with the largest government agency in the nation. Make an impact by advancing the Department of Defense’s mission to keep our country safe and secure.

Job Description

Transform technology into opportunity as an Incident Response SOC Analyst at GDIT. Shape what’s next for mission-critical government projects while shaping what’s next for your engineering career.

The F-35 Lightning II Program is the Department of Defense's focal point for defining affordable next generation strike aircraft weapon systems for the Navy, Air Force, Marines, and our allies. The F-35 will bring cutting-edge technologies to the battlespace of the future. The JSFs advanced airframe, autonomic logistics, avionics, propulsion systems, stealth, and firepower will ensure that the F-35 is the most affordable, lethal, supportable and survivable aircraft ever to be used by so many warfighters across the globe.

MEANINGFUL WORK AND PERSONAL IMPACT:

As an Incident Response SOC Analyst, the work you’ll do at GDIT will be impactful to the mission of our Cybersecurity team on the F-35 Lightning II Program.

  • Monitor and triage alerts from SIEM , EDR , IDS/IPS , and other security tools to identify suspicious activity.

  • Perform initial investigation and classification of security incidents; escalate when necessary.

  • Coordinate and orchestrate incident response efforts: containment, eradication, recovery, and documentation.

  • Support digital forensic investigations , including evidence collection, preservation, and basic analysis.

  • Provide regular status updates when conducting forensics.

  • Provide a written report at the conclusion of each forensics examination. Reports will include, at a minimum, the following information (a template and standard operating procedures will be made available on site to provide additional guidance):

    • Case File Number

    • Computer Name

    • User Name, File Names, etc.

    • Background

    • Investigation Details

    • Status/Disposition

    • Recommendations

  • Prepare and present forensic findings in the form of briefings and/or reports, to government leads and managers as required

  • Review logs and telemetry from endpoints, firewalls, servers, and cloud platforms to identify indicators of compromise (IOCs).

  • Collaborate with IT and security teams to apply mitigation actions such as patching, blocking IPs, and adjusting configurations.

  • Participate in post-incident reviews (PIRs) and help implement improvements to detection and response capabilities.

  • Contribute to the development and maintenance of SOC playbooks , runbooks , and response procedures.

  • Assist with Open-Source Intelligence (OSINT) monitoring and IOC enrichment.

  • Continuously improve knowledge of cybersecurity frameworks, threat actor TTPs (MITRE ATT&CK), and forensic methodologies

  • Handle sensitive file transfers IAW DoD Policies and procedures 

  • Query the classified network for any new vulnerabilities or weaknesses discovered by higher level commands that affect the status of the unclassified network

WHAT YOU’LL NEED TO SUCCEED:

Bring your engineering expertise along with a drive for innovation to GDIT. Our Incident Response SOC Analyst must have:

  • Security Clearance Level: Active Secret clearance.

  • Required Experience:

  • 5 years of foundational knowledge of cybersecurity concepts, such as incident handling lifecycle, threat intelligence, and basic to intermediate forensics.

  • Familiarity with security tools (SIEM, EDR, SOAR, threat intel feeds) and basic incident response workflows.

  • Hands-on experience with SIEM (e.g., MDE, Splunk, QRadar, ArcSight), EDR (e.g., CrowdStrike, Defender, SentinelOne), and basic SOAR concepts.

  • Experience with incident response tooling, digital forensics, and evidence handling.

  • Understanding of networking fundamentals (TCP/IP, DNS, VPNs, firewalls).

  • Strong analytical and problem-solving skills with a structured, methodical approach.

  • Excellent written and verbal communication; ability to produce clear incident reports, documentation and manuals.

  • Ability to work in a fast-paced environment and participate in on-call rotations (as needed).

  • Commitment to continuous learning and professional growth in cybersecurity.

  • Required Certifications: CompTIA Security+, CEH, SANS GCIH, GIAC GCIA, or equivalent

  • Education: BS degree in Computer Science, Information Security, Cybersecurity, or a related field.

  • Work Location: Hybrid - onsite in Arlington, VA + remote.

  • US Citizenship Required

WHAT WE’D LOVE FOR YOU TO HAVE (Desired):

  • Knowledge of MITRE ATT&CK framework and common attacker techniques.

  • Familiarity with cloud security concepts (AWS/Azure/GCP) and cloud incident response considerations.

  • Scripting or automation skills (PowerShell, Python, Bash) a plus.

GDIT IS YOUR PLACE
At GDIT, the mission is our purpose, and our people are at the center of everything we do.

  • Growth: AI-powered career tool that identifies career steps and learning opportunities

  • Support: An internal mobility team focused on helping you achieve your career goals

  • Rewards: Comprehensive benefits and wellness packages, 401K with company match, and competitive pay and paid time off

  • Flexibility: Full-flex work week to own your priorities at work and at home.

  • Community: Award-winning culture of innovation and a military-friendly workplace

OWN YOUR OPPORTUNITY
Explore a career in software development at GDIT and you’ll find endless opportunities to grow alongside colleagues who share your dedication to advancing innovation.

Work Requirements

Years of Experience

5 + years of related experience

* may vary based on technical training, certification(s), or degree

Certification

CompTIA Security+ CE | CompTIA - CompTIA

Travel Required

None

Citizenship

U.S. Citizenship Required

Job Tags

Work from home, Flexible hours,

Similar Jobs

Pro-MotionPix, LLC

Automotive Inventory Technician / Photographer Job at Pro-MotionPix, LLC

 ...Automotive Inventory Technician / Photographer Schedule: Full-Time, MondayFriday, 8:00 AM4:30 PM (or until work is completed) Route: San Jose, Palo Alto, Sunnyvale & Surrounding Areas Pay: $24.00+ per hour (base pay plus per-vehicle photo payout)... 

Crime Scene Resources, Inc

Forensic Specialist (Toxicology Unit) Job at Crime Scene Resources, Inc

 ...gather and analyze evidence. Requirements PREFERENCES: ~ Preference may be given to candidates with a degree in Chemistry, Toxicology or other physical sciences plus 0-2 years of progressive work experience in a forensic laboratory. KNOWLEDGE: Knowledge of... 

Yum & Chill Restaurant Group LLC

Director Of Real Estate Development Job at Yum & Chill Restaurant Group LLC

 ...Director Of Real Estate Development Yum Chill Restaurant Group, Finomus Group, Harmony Properties 5 - 10 years United States (USA) Job description Role: Director of Real Estate Development Work Location: Warren, NJ ABOUT THE JOB: Join our dynamic... 

Ultimart

Multi-Location Opener Job at Ultimart

 ...Multi-Location Opener Were excited to share a brand new opportunity theMulti-Location Opener! If youre someone who loves early mornings, is open to traveling between store locations in your district, and can arrive by4:00 a.m. to get things rolling, this could... 

GTGS Logistics

Delivery Associate - Amazon Packages Job at GTGS Logistics

 ...environment that celebrates diversity, growth and YOU!~ Position: Amazon DSP - Delivery Associate ~$20/HR+, performance incentives AND lots of...  .... About GTGS Logistics: Our company GTGS Prime Logistics, is a Delivery Service Partner with Amazon. Our Delivery...