F-35 Incident Response SOC Analyst | Active Secret clearance Job at General Dynamics Information Technology, Arlington, VA

VVpZMEducW1TY2N6U05xWUQ4d3o5ZDlQY3c9PQ==
  • General Dynamics Information Technology
  • Arlington, VA

Job Description

Public Trust: None
Requisition Type: Regular
Your Impact

Own your opportunity to work with the largest government agency in the nation. Make an impact by advancing the Department of Defense’s mission to keep our country safe and secure.

Job Description

Transform technology into opportunity as an Incident Response SOC Analyst at GDIT. Shape what’s next for mission-critical government projects while shaping what’s next for your engineering career.

The F-35 Lightning II Program is the Department of Defense's focal point for defining affordable next generation strike aircraft weapon systems for the Navy, Air Force, Marines, and our allies. The F-35 will bring cutting-edge technologies to the battlespace of the future. The JSFs advanced airframe, autonomic logistics, avionics, propulsion systems, stealth, and firepower will ensure that the F-35 is the most affordable, lethal, supportable and survivable aircraft ever to be used by so many warfighters across the globe.

MEANINGFUL WORK AND PERSONAL IMPACT:

As an Incident Response SOC Analyst, the work you’ll do at GDIT will be impactful to the mission of our Cybersecurity team on the F-35 Lightning II Program.

  • Monitor and triage alerts from SIEM , EDR , IDS/IPS , and other security tools to identify suspicious activity.

  • Perform initial investigation and classification of security incidents; escalate when necessary.

  • Coordinate and orchestrate incident response efforts: containment, eradication, recovery, and documentation.

  • Support digital forensic investigations , including evidence collection, preservation, and basic analysis.

  • Provide regular status updates when conducting forensics.

  • Provide a written report at the conclusion of each forensics examination. Reports will include, at a minimum, the following information (a template and standard operating procedures will be made available on site to provide additional guidance):

    • Case File Number

    • Computer Name

    • User Name, File Names, etc.

    • Background

    • Investigation Details

    • Status/Disposition

    • Recommendations

  • Prepare and present forensic findings in the form of briefings and/or reports, to government leads and managers as required

  • Review logs and telemetry from endpoints, firewalls, servers, and cloud platforms to identify indicators of compromise (IOCs).

  • Collaborate with IT and security teams to apply mitigation actions such as patching, blocking IPs, and adjusting configurations.

  • Participate in post-incident reviews (PIRs) and help implement improvements to detection and response capabilities.

  • Contribute to the development and maintenance of SOC playbooks , runbooks , and response procedures.

  • Assist with Open-Source Intelligence (OSINT) monitoring and IOC enrichment.

  • Continuously improve knowledge of cybersecurity frameworks, threat actor TTPs (MITRE ATT&CK), and forensic methodologies

  • Handle sensitive file transfers IAW DoD Policies and procedures 

  • Query the classified network for any new vulnerabilities or weaknesses discovered by higher level commands that affect the status of the unclassified network

WHAT YOU’LL NEED TO SUCCEED:

Bring your engineering expertise along with a drive for innovation to GDIT. Our Incident Response SOC Analyst must have:

  • Security Clearance Level: Active Secret clearance.

  • Required Experience:

  • 5 years of foundational knowledge of cybersecurity concepts, such as incident handling lifecycle, threat intelligence, and basic to intermediate forensics.

  • Familiarity with security tools (SIEM, EDR, SOAR, threat intel feeds) and basic incident response workflows.

  • Hands-on experience with SIEM (e.g., MDE, Splunk, QRadar, ArcSight), EDR (e.g., CrowdStrike, Defender, SentinelOne), and basic SOAR concepts.

  • Experience with incident response tooling, digital forensics, and evidence handling.

  • Understanding of networking fundamentals (TCP/IP, DNS, VPNs, firewalls).

  • Strong analytical and problem-solving skills with a structured, methodical approach.

  • Excellent written and verbal communication; ability to produce clear incident reports, documentation and manuals.

  • Ability to work in a fast-paced environment and participate in on-call rotations (as needed).

  • Commitment to continuous learning and professional growth in cybersecurity.

  • Required Certifications: CompTIA Security+, CEH, SANS GCIH, GIAC GCIA, or equivalent

  • Education: BS degree in Computer Science, Information Security, Cybersecurity, or a related field.

  • Work Location: Hybrid - onsite in Arlington, VA + remote.

  • US Citizenship Required

WHAT WE’D LOVE FOR YOU TO HAVE (Desired):

  • Knowledge of MITRE ATT&CK framework and common attacker techniques.

  • Familiarity with cloud security concepts (AWS/Azure/GCP) and cloud incident response considerations.

  • Scripting or automation skills (PowerShell, Python, Bash) a plus.

GDIT IS YOUR PLACE
At GDIT, the mission is our purpose, and our people are at the center of everything we do.

  • Growth: AI-powered career tool that identifies career steps and learning opportunities

  • Support: An internal mobility team focused on helping you achieve your career goals

  • Rewards: Comprehensive benefits and wellness packages, 401K with company match, and competitive pay and paid time off

  • Flexibility: Full-flex work week to own your priorities at work and at home.

  • Community: Award-winning culture of innovation and a military-friendly workplace

OWN YOUR OPPORTUNITY
Explore a career in software development at GDIT and you’ll find endless opportunities to grow alongside colleagues who share your dedication to advancing innovation.

Work Requirements

Years of Experience

5 + years of related experience

* may vary based on technical training, certification(s), or degree

Certification

CompTIA Security+ CE | CompTIA - CompTIA

Travel Required

None

Citizenship

U.S. Citizenship Required

Job Tags

Remote work, Work from home, Flexible hours,

Similar Jobs

Clean Harbors

Local Class B Hazmat Driver Job at Clean Harbors

 ...branch is seeking a Local Class B Truck Driver to pick up waste oil at customer locations...  ...for this role is $21-23/hr depending on experience. Job Description: Health and...  ...Responsibilities: Will operate a Class B Tanker Truck or Box Truck. Pump out tanks and... 

Ryder System

Warehouse material Handler First Shift Job at Ryder System

 ...Warehouse Employees to join us at Ryder to work with State of the Art Equipment in the Safest Warehouse EnvironmentVarious warehouse fulfillment specialist roles at Ryder support distribution across the US. Apply here with Ryder todayApply Online TodayWe have all benefits... 

Pittsburgh Robotics Network

Territory Manager and Drone Pilot Job at Pittsburgh Robotics Network

 ...Salary NaN NaN Posted Application Deadline: 10/28/2025 Pittsburgh based Identified Technologies is the fastest growing drone mapping and analytics company on the east coast and were hoping youll join our expanding team. Inc, TechCrunch, NBC, and CNN have... 

Tap Growth ai

Material Handler/ Warehouse Associate/ Logistics Coordinator Job at Tap Growth ai

 ...courses preferred. Minimum of three (3) years of experience in warehouse or materials functions, preferably in a Biotech/Pharmaceutical...  ...or purchasing systems Physical Requirements ~0-10% overnight travel required ~ The ability to climb, balance, stoop, kneel... 

SGS Consulting

Repair Technician Job at SGS Consulting

 ...Become fully trained and independently productive Contribute to repair throughput and quality Support documentation and compliance...  ...Mechanically inclined Experience with cell phone repair Laptop repair experience Networking and computer hardware skills...