Cybersecurity Infrastructure Administrator
Listed on 2026-01-12
-
IT/Tech
Cybersecurity, Systems Engineer, IT Consultant
Type of Requisition
Regular
Clearance Level Must Currently PossessTop Secret/SCI
Clearance Level Must Be Able to ObtainTop Secret/SCI
Public Trust/Other RequiredNone
Job FamilyCyber and IT Risk Management
Job Qualifications- Skills:
IPS/IDS, Security Requirements, System Security - Certifications:
None - Experience:
5+ years of related experience - US Citizenship
Required:
Yes
Advance your career while impacting our national security in cyber as a Cybersecurity Infrastructure Administrator e, technologists have many paths to grow a meaningful career supporting cyber missions and operations across the federal government.
MEANINGFUL WORK AND PERSONAL IMPACTAs a Cybersecurity Infrastructure Administrator
, the work you’ll do at GDIT will be impactful to the mission of USCENTCOM. You will play a crucial role in configuring, tuning, optimizing, and maintaining critical security infrastructure to safeguard the organization’s digital assets against evolving cyber threats. You'll be responsible for overseeing the operation and maintenance of essential cybersecurity systems, including IDS/IPS technologies, Security Onion, and firewalls from different vendors and network taps.
- Configuration and Optimization:
- Collaborate with cybersecurity stakeholders to define and implement effective configurations for boundary infrastructure and network access control solutions.
- Customize and optimize alert rules, correlation searches, and detection mechanisms to align with security requirements and organizational objectives.
- Work with other Cybersecurity Engineering team members and will be required to interact with end users to gather requirements, perform troubleshooting, and aid as necessary.
- Integrate cyber tools with variety of legacy data sources.
- Maintenance and Support:
- Conduct routine maintenance tasks, such as software updates, patches, and performance tuning, to ensure the reliability and efficiency of cybersecurity systems.
- Provide timely support and troubleshooting assistance to address issues and incidents related to various IDS/IPS, firewall, security onion or other boundary and sensor related technology, collaborating with vendors or higher‑level support as necessary.
- Perform regular system audits and health checks to identify vulnerabilities, misconfigurations, or performance issues, implementing corrective actions as needed.
- Provide occasional presentations of tool capabilities to leadership.
- Policy Development and Compliance:
- Develop and enforce configuration standards, security policies, and operational procedures for cybersecurity systems, ensuring compliance with regulatory requirements and industry best practices.
- Monitor compliance with security policies and regulations through audits, assessments, and reporting activities, taking corrective actions to address any deviations or gaps.
- Collaborate with compliance and audit teams to streamline regulatory compliance efforts and demonstrate adherence to security standards.
- Integration and Automation:
Integrate cybersecurity systems with other security controls, data sources, and IT infrastructure components to create a cohesive security ecosystem. - Develop and maintain automation scripts, playbooks, and workflows as capable within boundary related platforms to automate routine tasks, orchestrate incident response processes, and enhance operational efficiency.
- Explore opportunities for innovation and continuous improvement by leveraging automation, orchestration, and integration with emerging technologies and industry trends.
- Training and Knowledge Sharing:
- Provide training sessions and document processes to empower internal teams with the knowledge and skills required to effectively utilize cybersecurity systems.
- Share expertise, best practices, and lessons learned with colleagues through formal and informal channels, fostering a culture of collaboration and knowledge sharing within the cybersecurity team.
Bring your cyber expertise and drive for innovation to GDIT. The Information Security Analyst Principal must have:
- Education:
Bachelor’s degree in Information Systems, Computer Science, Computer Engineering, or another related…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).