Looking for an opportunity to make an impact?
At Leidos, we deliver innovative solutions through the efforts of our diverse and talented people dedicated to our customers’ success. We empower our teams, contribute to our communities, and operate sustainably. Everything we do is built on a commitment to do the right thing for our customers, our people, and our community. Our mission of “making the world safer, healthier, and more efficient” and our values— as one of the World’s Most Ethical Companies TM from 2018 to 2022— guide everything we do in business. We are recognized as one of leading employers in hiring military and veterans, with military veterans making up ~20% of our workforce.
Leidos Life represents our renewed commitment to putting our employees first with a focus on career, flexibility, and well-being. Leidos is a people company, plain and simple. The only way Leidos succeeds and continues to grow is if we grow together. Leaders and employees are encouraged to have ongoing career conversations that focus on uncovering interests, collaborating on actions, and seeking out “what’s next.” A variety of learning methods are offered, including on-the-job training, education, peer-to-peer learning, mentoring, and coaching. Internal mobility, where employees are supported to move within for growth and development, is fostered. We understand flexibility is at the heart of engagement, productivity, and frankly, life. Promoting flexible options where we can and providing choices in how, when, and where we work contributes to a better quality of life for all of us. We know our employees share in and take pride in our mission to make the world safer, healthier, and more efficient and need flexible options to deliver on that mission. We also take a 360 approach to well-being. Leidos offers a variety of resources to employees focusing holistically on mental health, financial wellness, and physical fitness. We’re in it for the long haul, growing to meet today’s challenges and preparing for the ones yet to come, and we want you there every step of the way.
Your greatest work is ahead!
Provide cybersecurity incident handling for Army networks. This includes performing real-time cyber threat intelligence analysis, correlating actionable security events, performing network traffic analysis using raw packet data, and participating in the coordination of resources during the incident response process.
If this sounds like the kind of environment where you can thrive, keep reading!
Leidos Defense Group provides a diverse portfolio of systems, solutions, and services covering land, sea, air, space, and cyberspace for customers worldwide. Solutions for Defense include enterprise and mission IT, large-scale intelligence systems, command and control, geospatial and data analytics, cybersecurity, logistics, training, and intelligence analysis and operations support. Our team is solving the world’s toughest security challenges for customers with “can’t fail” missions. To explore and learn more, click here!
Are you ready to make an impact? Begin your journey of a flourishing and meaningful career, share your resume with us today!
Act as main investigator for potential incidents identified by cyber analysts
Handle incidents through their lifecycle; work with users to analyze, triage, contain, and remediate security incidents
Responsible for the coordination and reporting of incident related data between internal offices and third parties
Document and communicate guidance to end users and senior officials
Preparing situational awareness reports for management
Assist with the development and documentation of processes to ensure consistent and scalable response operations, and ensure continuous improvement to the customer's incident response plan
Timely dissemination of information to the appropriate stakeholders
Utilize alerts from endpoints, IDS/IPS, netflow, and custom sensors to identify compromises on customer networks/endpoints.
Review log files, pivot between data sets, and correlate evidence for incident investigations.
Triage alerts to identify malicious actors on customer networks.
Document analysis, findings, and actions in case/knowledge management system.
Create and distribute incident reports to customers and higher headquarters.
Manage incident tickets and provide status updates on each ticket per SLA
Must have an active Top Secret/SCI security clearance
Bachelor's degree in a relevant field and minimum of 6+ years experience OR a Master's degree and at least 3 years of experience
CND experience (Protect, Detect, Respond and Sustain) within a Computer Incident Response organization.
Must have at least one of the following certifications: CERT Certified Computer Security Incident Handler, ECC CEH (Electronic Commerce Council Certified Ethical Hacker), GCIH (GIAC Certified Incident Handler), GISF (GIAC Information Security Fundamentals), CISSP (ISC2 Certified Information System Security Professional). Additional certifications at an equivalent may also be considered.
Willing to perform shift work.
Strong analytical and troubleshooting skills.
Familiarity with information security publications (e.g., NIST 800-53)
Familiarity or experience in Cyber Kill Chain methodology * Inquisitive, problem-solving oriented
Solid understanding of cyber landscape and typical threat vectors
Possess a wide range of knowledge of information security tools and techniques
Ability to analyze firewall logs, Full Packet Capture (PCAP), IDS alerts, Anti-malware alerts, Host Intrusion Prevent System (HIPS), and server and application logs
Competent with TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements.
Conduct reviews and analysis of proxy logs, Microsoft Windows and Active Directory logs, Orchestrator logs, and malicious code and other attack artifacts
Able to effectively manage evolving and competing objectives
Ability to work independently with minimal supervision, in order to meet deadlines
Detail and process oriented
Understanding of the life cycle of network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs).
Understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements.
Hands-on experience analyzing high volumes of logs, network data (e.g. Netflow, Full Packet Capture), and other attack artifacts in support of incident investigations.
In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g. ArcSight, Splunk, Nitro/McAfee Enterprise Security Manager, QRadar, LogLogic).
Experience and proficiency with any of the following: Anti-Virus, HIPS/HBSS, IDS/IPS, Full Packet Capture, Network Forensics.
Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs).
Experience with malware analysis concepts and methods.
Windows and/or Linux or vendor agnostic Operating System Certification (e.g. RHCSA, Linux+, Server+)
Proficient in Windows Server and Red Hat Linux operating systems
Familiarity with Unix/Linux command line or scripting and programming experience.
Working experience with tuning and managing cyber security tools
Working knowledge of database and operating system security
Experience using Microsoft Active Directory to manage group policy, computer and user objects
Ability to multi-task, work independently and as part of a team, share workloads, and deal with sudden shifts in project priorities
Seek out information and data to evaluate, prioritize and formulate best solution or practice
Ability to function in a fast-paced environment and effectively manage multiple tasks simultaneously; coordinating resources and ensuring scheduled goals are met
Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework.
Ability to perform deep dive investigations from start to finish of a security incident using data from both host based and network based devices.
Ability to forensically investigate both Windows and Linux devices for compromise.
Ability to analyze malicious files through code analysis/reverse engineering.
Ability to perform introspection of incident for after action reports to both technical and non-technical staff
Exposure to handling classified incidents
Understanding of offensive security (threat hunting and penetration testing)
Understanding of SIEM and SOAR products
Understanding of EDR technologies
Strong analytical and troubleshooting skills.
Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings
TS/SCI with the ability to obtain a CI Poly if hired
Army Cyber Command (Arcyber) Cyberspace Operations Support
Pay Range:Pay Range $78,000.00 - $120,000.00 - $162,000.00
The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Leidos is a Fortune 500® technology, engineering, and science solutions and services leader working to solve the world’s toughest challenges in the defense, intelligence, civil, and health markets. The company’s 44,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $13.7 billion for the fiscal year ended December 31, 2021. For more information, visit www.Leidos.com.
Pay and Benefits
Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available here.
Securing Your Data
Beware of fake employment opportunities using Leidos’ name. Leidos will never ask you to provide payment-related information during any part of the employment application process (i.e., ask you for money), nor will Leidos ever advance money as part of the hiring process (i.e., send you a check or money order before doing any work). Further, Leidos will only communicate with you through emails that are generated by the Leidos.com automated system – never from free commercial services (e.g., Gmail, Yahoo, Hotmail) or via WhatsApp, Telegram, etc. If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at [email protected].
If you believe you are the victim of a scam, contact your local law enforcement and report the incident to the U.S. Federal Trade Commission.
Commitment to Diversity
All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws.