Cyber Threat Mobile Researcher (Active Secret Clearance) in Arlington, VA at General Dynamics Information Technology

Date Posted: 8/12/2019

Job Snapshot

  • Employee Type:
    Full-Time
  • Location:
    Arlington, VA
  • Job Type:
  • Experience:
    Not Specified
  • Date Posted:
    8/12/2019
  • Job ID:
    RQ38674

Job Description

Are you highly organized and able to support multiple priority efforts at the same time?  Do you thrive in fast-paced programs?  Can you prioritize tasks in order to allow your executive leadership team to focus on what’s hot? Will the risk of not delivering top-quality products on-time keep you up at night?  Then GDIT is looking for you to fill an essential Cyber Threat Mobile Researcher role supporting our cybersecurity program.

Program Description: Serves as a Cyber Threat Mobile Researcher in support of a major federal client.  This organization provides services that analyze and produce enhanced cyber security and threat intelligence information to include threats and potential threats to the customer’s information and information systems; provides timely and relevant technical analysis to assist with mitigating cyber threats confronting the Department; supports evaluation, implementation, and operations of tools/technologies used in advanced analysis. Responsible for the delivery of written and oral briefings to stakeholders and community partners across the Foreign Affairs community.    

Functional Duties: 

The researcher should be able to:

  • Provide expert cybersecurity knowledge of enterprise mobility systems to business and technology teams and facilitate the collaborative development of the security of the mobile technology strategy.
  • Determine the most efficient methodology and path for securing the mobile infrastructure, to include assessing technical configurations and security settings for mobile devices.
  • Understand threats to mobile ecosystems and have the ability to architect security solutions in support of mobile environments.
  • Assess and integrate iOS, Android, and tablet devices into an integrated mobile threat platform and mobile device management environment
  • Evaluate, recommend, and support operational changes and modifications to secure the mobile environment

Key Personality traits that will do well in this environment

  • Inquisitive by nature; you know where to look to find answers
  • You enjoy collaboration and sharing information with other highly technical people.

Environment you will work in

  • The intersection of Cybersecurity and data. No better place to be.
  • Highly technical and fast pace environment.
  • No remote work / no travel

Daily Responsibilities:

  • Exceptional communication skills, both verbal and written
  • Strong attention to detail
  • Ability to work alone and in team environments
  • Critical thinking skills
  • Familiarity with iOS or Android operating systems
  • Experience imaging digital media
  • Knowledge of common digital forensic techniques and practices
  • Experience flashing and using custom ROMs
  • Development/analysis of mobile device applications
  • Ability to read and understand assembly code (ARM, x86, x64, etc.)
  • Experience utilizing commercial imaging tools such as Cellebrite, Oxygen, or Axiom
  • Reverse engineering or application tear-down experience is a plus

To fit into our environment you must have these core skills:

  • 4-5 years of experience advanced technical analysis with increasing responsibilities. Demonstrated oral and written communications skills.   
  • Good working knowledge of cyber threat analytics  
  • Previous experience working in cross functional and interdisciplinary project teams to achieve tactical and strategic objectives 
  • Proven ability to document and teach team members how to apply advanced analytic techniques to solve complex problems  
  • Solid understanding of enterprise IT cybersecurity operational environments 

Highly desired skills

  • Four years’ of experience in security with a focus on forensics, static code reverse engineering, and advanced (packet) network analysis. Static code reverse engineering experience can be substituted by experience in similar skill in forensics, network analysis, mobile device forensics related to malicious code, or other similar skill 
  • Three years’ of experience in intelligence or technical analysis with a focus on cyber threat analysis.  
  • Experience analyzing emerging technologies for potential attack vectors and developing mitigation strategies 
  • Ability to evaluate offensive and intelligence-based threat actors based on motivation and common TTPs 
  • Experience with gathering open-source and controlled intelligence to develop predictive understanding of adversarial strategies, priorities, and overlapping interests 
  • Demonstrated expertise in deploying and maintaining open source network security monitoring and assessment tools 

#CSOSFeaturedArticle

For more than 50 years, General Dynamics Information Technology has served as a trusted provider of information technology, systems engineering, training, and professional services to customers across federal, state, and local governments, and in the commercial sector. Over 40,000 GDIT professionals deliver enterprise solutions, manage mission-critical IT programs, and provide mission support services worldwide. GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.','industry