×
Register Here to Apply for Jobs or Post Jobs. X

Cyber Security Analyst - TS​/SCI w​/Polygraph

Job in McLean, Fairfax County, Virginia, USA
Listing for: General Dynamics Information Technology
Full Time position
Listed on 2026-03-01
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, IT Consultant
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below
Position: Cyber Security Analyst - TS/SCI w/ Polygraph

Type of Requisition:

Regular

Clearance Level Must Currently Possess:

Top Secret SCI + Polygraph

Clearance Level Must Be Able to Obtain:

Top Secret SCI + Polygraph

Public Trust/Other

Required:

None

Job Family:

Cyber and IT Risk Management

Job Qualifications:

Skills: Cloud:
Amazon Web Services (AWS), Continuous Monitoring, Risk Management Framework (RMF), Standard Operating Procedure (SOP)

Certifications: None

Experience: 8+ years of related experience

US Citizenship

Required:

Yes

Job Description:

Own your career as a Cyber Security Analyst e, you’ll have the opportunity to build strong lines of cyber defense using cutting‑edge technologies. Your work in cyber security at GDIT will have an impact on securing our clients’ missions and ensuring we anticipate the threats of tomorrow.

At GDIT, people are our differentiator. As a Cyber Security Analyst, you will help ensure today is safe and tomorrow is smarter.

HOW A CYBER SECURITY ANALYST SR ADVISOR WILL MAKE AN IMPACT
  • Provide vulnerability analysis and reporting on accredited information systems.
  • Create documentation such as SOPs, internal process documents and input into cyber policies that support the continuous monitoring of accredited information systems.
  • Coordinate with information system POCs for plan updates and mitigation strategies to ensure overall health of IT systems, networks and applications.
  • Interprets, analyzes, and reports all events and anomalies in accordance with computer network directives, including initiating, responding, and reporting discovered events
  • Ensures that cybersecurity plans, controls, processes, standards, policies, and procedures are aligned with cybersecurity standards
  • Develops techniques and procedures for conducting cybersecurity risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks or leaks
  • May coach and provide guidance to less‑experienced professionals
  • May serve as a team or task lead
WHAT YOU’LL NEED TO SUCCEED:
  • Conduct comprehensive risk assessments to identify vulnerabilities and threats
  • Assist with development and maintenance of the organization’s risk management framework
  • Collaborate with stakeholders to define and implement security policies and controls
  • Contribute to incident response planning and post‑incident analysis
  • Prepare risk reports and present findings to senior management
  • Stay updated on the latest cyber security trends, threats, and technologies.
  • Provide vulnerability analysis and reporting on accredited information systems. Experience in scanning information systems using scanning tools such as Tenable/Nessus, App Detective, Rapid7, Web Inspect
  • Strong writing skills to create documentation such as SOPs, internal process documents and input into cyber policies that support the continuous monitoring of accredited information systems
  • Coordinate with information system POCs for plan updates and mitigation strategies to ensure overall health of IT systems, networks and applications
  • Experience with architecture design, system and network analysis, vulnerability and risk assessments, and security assessment of hardware and software.
  • Perform some manual data aggregation and normalization tasks until automated solutions are developed
  • Strong understanding of cloud environments and assessing systems within cloud environments focusing on security posture
  • Experience with continuous monitoring and plans of actions and milestones (POA&Ms)
  • Understanding of NIST 800-53, 800-137 and Risk Management Framework (RMF)
  • Knowledge of DoD Security Technical Implementation Guides (STIGs)
  • Demonstrated experience with cyber security concepts to include encryption services, access control, information protection, network security
  • Experience with AWS and Azure cloud security compliance
  • Knowledgeable of various cloud services to include Infrastructure as a Service, Platform as a Service, Software as a Service
  • Possesses strong analytical and problem solving skills
  • Additional

    Skills:

  • provide relevant analysis & recommendation with a risk management mindset.
  • excellent writing skills that…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary