Today
Public Trust
Unspecified
Unspecified
IT - Security
Remote/Hybrid• (Off-Site/Hybrid)
GDIT is your place. You make it your own by bringing your ideas and unique perspective to our culture. At GDIT, cybersecurity is not just a singular part of our mission-it connects every one of us because it's embedded into every aspect of what we do.
By owning your opportunity at GDIT, you are helping us ensure today is safe and tomorrow is smarter. Our work depends on an experienced Senior Cyber Threat Intelligence Analyst to protect the program and assets from cyber threats. You will assist in anticipating and responding effectively to cyber threats
As the Senior Cyber Threat Intelligence Analyst you will:
• Identify emerging cyber threats, vulnerabilities, and attack trends based on information from various sources, including open-source research, dark web forums, and threat intelligence feeds.
• Conduct in-depth analysis of cyber threat intelligence data to identify patterns, trends, and indicators of compromise (IOCs) associated with potential cyber-attacks.
• Produce high-quality written and oral reports, briefings, and presentations to communicate cyber threat intelligence findings, assessments, and recommendations to senior leadership, stakeholders, and technical teams in a clear and actionable manner.
• Proactively search for signs of malicious activity within the organization's network and systems utilizing threat intelligence to identify and investigate potential security incidents or anomalies.
• Enhance the organization's cyber threat intelligence capabilities and methodologies in accordance with the latest cybersecurity threats, trends, and technologies.
• Contribute to the development of cybersecurity strategies, policies, and procedures based on threat intelligence insights and analysis, helping to prioritize security investments and initiatives to mitigate emerging threats effectively.
• Participate in information sharing initiatives and collaborate with industry peers, government agencies, and cybersecurity communities to exchange threat intelligence and enhance collective cyber defense capabilities.
• Collaborate with vulnerability management teams to prioritize and assess the severity of vulnerabilities.
• Provide written recommendations on Government drafts of executive summaries and briefings.
• Incorporate data from federal partners, and other vendors to expand threat awareness and bolster proactive defense strategies.
• Detect and study emerging vulnerabilities, attack trends, and threat patterns through internal data, open-source intelligence, and integrated feeds from trusted platforms.
• Use Splunk and other tools to identify unusual activities, create actionable alerts, and monitor potential security incidents in real time.
What You Will Need:
• Bachelor's degree in a related business or technical discipline. Bachelors degree in Cybersecurity preferred.
• 10 years' experience in conducting in-depth analysis of cyber threats, including malware, phishing campaigns, and other attack vectors. This involves identifying patterns, trends, and indicators of compromise (IOCs) to understand threat actor tactics, techniques, and procedures (TTPs).
• 10 years' experience in collecting and aggregating threat intelligence from various sources, such as opensource intelligence (OSINT), dark web forums, and commercial threat intelligence feeds. This includes evaluating the credibility and relevance of intelligence sources and identifying actionable intelligence for the organization.
• 10 years' experience in producing written and oral reports, briefings, and presentations to communicate threat intelligence findings, assessments, and recommendations to stakeholders at all levels of the organization.
• 5 years working in an office environment with technical IT personnel.
• 5 years of experience using cybersecurity tools and technologies for threat intelligence analysis, such as threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and malware analysis tools.
• Active Certification: Security+ and Network+ or related cybersecurity certification
Security Clearance Level:
• Ability to obtain and maintain a Public Trust clearance
Location:
• This position is remote.
Timeline:
• This is a contingent posting, expected to start late 2025/early 2026.
GDIT IS YOUR PLACE:
• 401K with company match
• Comprehensive health and wellness packages
• Internal mobility team dedicated to helping you own your career
• Professional growth opportunities including paid education and certifications
• Cutting-edge technology you can learn from
• Rest and recharge with paid vacation and holidays
Work Requirements
By owning your opportunity at GDIT, you are helping us ensure today is safe and tomorrow is smarter. Our work depends on an experienced Senior Cyber Threat Intelligence Analyst to protect the program and assets from cyber threats. You will assist in anticipating and responding effectively to cyber threats
As the Senior Cyber Threat Intelligence Analyst you will:
• Identify emerging cyber threats, vulnerabilities, and attack trends based on information from various sources, including open-source research, dark web forums, and threat intelligence feeds.
• Conduct in-depth analysis of cyber threat intelligence data to identify patterns, trends, and indicators of compromise (IOCs) associated with potential cyber-attacks.
• Produce high-quality written and oral reports, briefings, and presentations to communicate cyber threat intelligence findings, assessments, and recommendations to senior leadership, stakeholders, and technical teams in a clear and actionable manner.
• Proactively search for signs of malicious activity within the organization's network and systems utilizing threat intelligence to identify and investigate potential security incidents or anomalies.
• Enhance the organization's cyber threat intelligence capabilities and methodologies in accordance with the latest cybersecurity threats, trends, and technologies.
• Contribute to the development of cybersecurity strategies, policies, and procedures based on threat intelligence insights and analysis, helping to prioritize security investments and initiatives to mitigate emerging threats effectively.
• Participate in information sharing initiatives and collaborate with industry peers, government agencies, and cybersecurity communities to exchange threat intelligence and enhance collective cyber defense capabilities.
• Collaborate with vulnerability management teams to prioritize and assess the severity of vulnerabilities.
• Provide written recommendations on Government drafts of executive summaries and briefings.
• Incorporate data from federal partners, and other vendors to expand threat awareness and bolster proactive defense strategies.
• Detect and study emerging vulnerabilities, attack trends, and threat patterns through internal data, open-source intelligence, and integrated feeds from trusted platforms.
• Use Splunk and other tools to identify unusual activities, create actionable alerts, and monitor potential security incidents in real time.
What You Will Need:
• Bachelor's degree in a related business or technical discipline. Bachelors degree in Cybersecurity preferred.
• 10 years' experience in conducting in-depth analysis of cyber threats, including malware, phishing campaigns, and other attack vectors. This involves identifying patterns, trends, and indicators of compromise (IOCs) to understand threat actor tactics, techniques, and procedures (TTPs).
• 10 years' experience in collecting and aggregating threat intelligence from various sources, such as opensource intelligence (OSINT), dark web forums, and commercial threat intelligence feeds. This includes evaluating the credibility and relevance of intelligence sources and identifying actionable intelligence for the organization.
• 10 years' experience in producing written and oral reports, briefings, and presentations to communicate threat intelligence findings, assessments, and recommendations to stakeholders at all levels of the organization.
• 5 years working in an office environment with technical IT personnel.
• 5 years of experience using cybersecurity tools and technologies for threat intelligence analysis, such as threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and malware analysis tools.
• Active Certification: Security+ and Network+ or related cybersecurity certification
Security Clearance Level:
• Ability to obtain and maintain a Public Trust clearance
Location:
• This position is remote.
Timeline:
• This is a contingent posting, expected to start late 2025/early 2026.
GDIT IS YOUR PLACE:
• 401K with company match
• Comprehensive health and wellness packages
• Internal mobility team dedicated to helping you own your career
• Professional growth opportunities including paid education and certifications
• Cutting-edge technology you can learn from
• Rest and recharge with paid vacation and holidays
Work Requirements
group id: 90979310
Explore the Art of the Possible | GDIT