Cyber Developer SME – FBI ECS Position Available In Madison, Alabama
Tallo's Job Summary: The Cyber Developer SME position at FBI ECS requires a Top Secret clearance and is located in Huntsville, Alabama and Clarksburg, West Virginia. Key skills include Cyber Threat Intelligence, Incident Response, and Security Information and Event Management. Responsibilities involve enhancing incident detection and response, developing cybersecurity strategies, and investigating security incidents. The likely salary range is $139,001-$188,059.
Job Description
Cyber Developer SME
- FBI ECS
Clearance Level
Top Secret
Category
Cyber Security
Locations
Huntsville, Alabama
Clarksburg, West Virginia
(Onsite Workplace) Key Skills For Success Cyber Threat Intelligence Incident Response Information Security Security Incident Response Security Information and Event Management (SIEM) SHARE
REQ#:
RQ198441
Public Trust:
None
Requisition Type:
Regular
Your Impact Own your opportunity to work alongside federal civilian agencies. Make an impact by providing services that help the government ensure the well being of U.S. citizens. Job Description
CYBER CAPABILITY DEVELOPER SENIOR
Own your career as a Cyber Capability Developer Senior at GDIT. Here, you’ll have the opportunity to build strong lines of cyber defense using cutting-edge technologies. Your work in cyber security at GDIT will have an impact on securing our clients’ missions and ensuring we anticipate the threats of tomorrow. At GDIT, people are our differentiator. As a Cyber Capability Developer SME you will help ensure today is safe and tomorrow is smarter. Our work depends on you joining our team.
THE PROGRAM
Work on the program responsible for continually monitoring, detecting, and responding to security incidents that may occur on the networks, IT services, and systems of a large Federal agency where you will be part of a centralized command and control environment, ensuring seamless collaboration among security analysts, threat intelligence teams, streamlined incident response workflows, collaborative intelligence-sharing platforms, and stakeholders in addition to facilitating the collection and correlation of data from various sources, supporting the mission to detect, respond to, and mitigate cyber threats promptly. You will be part of the watch floor team which operates around the clock, 24/7, 365 days a year, to ensure the timely detection and resolution of potential security incidents, thereby minimizing the impact of cyber threats on the organization. The watch floor team is responsible for actively detecting, monitoring, preventing, and analyzing real-time cybersecurity information, events, and threats. Serving as the operational hub, the watch floor plays a critical role in safeguarding the confidentiality, integrity, and availability of the organization’s information assets.
KEY RESPONSIBILTIES
Collaborate with the Watch Floor Team to enhance incident detection and response
Develop, implement, and maintain cybersecurity strategies, policies, procedures, and incident response plans.
Investigate security incidents and provide guidance and recommendations
Prepare threat assessments and vulnerability analyses to identify potential risks. Utilize Splunk Enterprise Security and Microsoft Sentinel for monitoring and analyzing security events.
Training and mentorship on cybersecurity best practices.
Maintain currency on the latest cybersecurity trends, threats, and technologies.
WHAT YOU’LL NEED TO SUCCEED
6+ years’ experience with Cybersecurity principles, practices, and frameworks, including Incident Response Frameworks, Executive Orders and National Cybersecurity Strategies, CIS Controls, ISO/IEC 27001, NIST Cybersecurity Framework and Federal Information Security Management Act (FISMA)
Compliance requirements and regulations relevant to cybersecurity, such as GDPR, HIPAA, and PCI DSS, ensuring adherence to industry standards
Security information and event management (SIEM) tools
Collaboration with analysts and other security stakeholders to understand the organization’s security needs and translate them into actionable use cases Documentation skills to create and maintain comprehensive incident response procedures, playbooks, and detailed reports on security incident
- Software Experience Splunk Enterprise Security Software (required)
Security information and event management (SIEM) experience (required) with Microsoft Sentinel Software (preferred - Certifications (one of the following is preferred) GIAC Continuous Monitoring (GMON)
GIAC Certified Incident Handler (GCIH)
GIAC Certified Forensic Analyst (GCFA)
GIAC Certified Intrusion Analyst (GCIA)
GIAC Network Forensic Analyst (GNFA)
Education:
Technical Training, Certification(s) or
Degree/Experience:
Minimum Education:
Bachelors in Cybersecurity, Information Technology or a related field and a minimum of 6 years’ experience.
Substitutions Allowed:
No Degree
- 10 years; Associates
- 8 years; Master’s
- 4 years; Ph.D
- 2 years
Security Clearance Level:
Top Secret (TS) level with the ability to obtain access to Sensitive Compartmented Information (TS/SCI)
Location:
Onsite
- US Citizenship Required
GDIT IS YOUR PLACE
- 401K with company match
- Comprehensive health and wellness packages
- Internal mobility team dedicated to helping you own your career
- Professional growth opportunities including paid education and certifications
- Cutting-edge technology you can learn from
- Rest and recharge with paid vacation and holidays Work Requirements
Years of Experience 6 + years of related experience - may vary based on technical training, certification(s), or degree Certification Travel Required Less than 10% Citizenship U.S. Citizenship Required Salary and Benefit Information The likely salary range for this position is $139,001
- $188,059.
This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.