To our valued Leidos candidates:

Coronavirus is on everyone's mind with the effects being felt around the world. The markets are volatile, and we're all concerned for the health and safety of our families, friends, and colleagues. Please know that we're taking all necessary measures to safeguard our employees, customers and the communities in which we live, including following all recommended best practices around social distancing.

With that in mind, in an abundance of caution, we are canceling all face to face career events, such as job fairs and open house events. In the coming days and weeks, we will be hosting career events virtually, using our online chat tools so that we may continue our hiring practice safely and securely. You can find available virtual career events at

We are using telephone meetings and online chats via Brazen to conduct interviews and hiring discussions, and we are offering options for video interviews so that you can have a virtual face to face meeting with your potential new leader. We do not conduct interviews or extend offers via text or chat based social media, such as WhatsApp or MySpace.

Leidos will never ask you to provide payment-related information at any part of the employment application process, nor will Leidos ever advance money as part of the hiring process. And Leidos will communicate with you only through emails that are generated by automated system. If you receive an email purporting to be from Leidos that asks for payment-related information or any other personal information, please report the email to Chris Scalia, Leidos’ Senior Vice President of Talent Acquisition, at [email protected].

As a company, as a country, as a world, we have confronted challenging moments before. We are confident that, guided by our values and the strength of our community as well as the commitment we have to the important work we do each day, we will find our way through this time together. We will do this with the care and concern for one another and the common good that defines. Please keep those impacted by the virus in your thoughts.

Close Window
Join our talent network
Skip to main content

Job #: R-00101014
Location: Washington, DC
Category: Cyber Operations
Schedule (FT/PT): Full Time
Travel Required: No
Shift: Day
Potential for Telework: No
Clearance: Top Secret/SCI with Polygraph
Referral Eligibility: Eligible
Referral Bonus Amount: $5000
Group: Intelligence

Share: mail twitter linkedin


Job Description:

At Leidos, we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customers’ success. We empower our teams, contribute to our communities, and operate sustainable practices. Everything we do is built on a commitment to do the right thing for our customers, our people, and our community. Our Mission, Vision, and Values guide the way we do business. Employees enjoy career enrichment opportunities available through mobility and development and experience rewarding relationships with supportive supervisors and talented colleagues and customers. Your most important work is ahead.

If this sounds like the kind of environment where you can thrive, keep reading!

The CND Incident Response Lead will serve as the principle technical advisor and subject matter expert for CND Incident Response services. They will be an expert for enterprise incident response. The CND/IR Lead should be a multi-functional individual with strong leadership and technical skills including but not limited to the following core IR Cyber Security domains; cybersecurity incident response phase protocols of triage, isolate, contain, recovery and remediate; digital forensics evidence preservation, collection, and analysis; incident scope, impact, and risk considerations. Candidates should understand the incident response process in accordance with Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510.01 and other applicable DoD/IC directives and policies.

Work hours are flexible though need to be within the customer’s core business hours of 0600-1800. On-call support/hours may be required.

Primary Responsibilities:

  • Lead a team of cyber professionals responsible for enterprise-wide cyber incident response functions.
  • Design, implement, train an incident response team with all the necessary technical, communication and collaboration skills to perform successful IR work
  • Build and implement IR playbooks and leverage automation to reduce IR fatigue, speed triage and isolation tasks and accuracy
  • Plan, schedule and manage a 24/7/365 incident response team
  • Lead and orchestrate the technical incident response functions involving all cyber incidents and lead host and network based forensic analysis and reporting
  • Track and document CND incidents from initial detection through final resolution.
  • Perform CND incident triage to include determining scope, urgency, and potential impact; identify the specific vulnerability and make recommendations which enable expeditious remediation.
  • Correlate incident data and perform CND trend analysis and reporting.
  • Support insider threat response, fraud, waste and abuse and legal tasks through the use of digital forensic and defensible evidence collection, processing, and preservation
  • Measure performance, effectiveness, and timeliness of IR services through routine metrics and operational analysis
  • Support or conduct CND/CI coordination and reporting to the organization, DoD, and IC
  • Write and publish cyber defense techniques, guidance, and reports on incident findings
  • Coordinate and work cross-functionally with legal, risk and compliance functions

Basic Qualifications:

  • Ability as the technical Subject Matter Expert (SME) in leading a team of staff incident responders to rapidly triage, isolate, contain, and recover from a cyber incident
  • Experience utilizing IR technical tools (SIEM, Endpoint, DLP, Forensics) to facilitate and accelerate response actions and investigations. Previous technical experience orchestrating and managing incident response functions in a highly complex SOC environment.
  • Familiarity with the utilization, configuration, and implementation of industry standard cyber defense capabilities including but not limited to web content filters, email security capabilities, IDS, IPS, HBSS, SIEM, Domain Name System (DNS) security practices, advanced log analysis, network monitoring, network flow analysis, packet capture analysis, network proxies, firewalls, anti-virus capabilities, Linux/UNIX command line, and access control lists.
  • Familiarity with malware triage and analysis, system and network forensics, log analysis and evidentiary procedures.
  • Understanding of the lifecycle of the network threats, attack vectors and methods of exploitation.
  • Understanding of the incident detection processes and procedures to aid in the facilitation of comprehensive procedures for collaboration and incident escalation from other DCNDC functional teams.
  • Strong leadership skills with the ability to collaborate across technical SOC and risk/compliance functions
  • Experience managing in a 24/7/365 environment
  • Excellent oral and written communication skills. Ability to communicate and work effectively with other contractors and Government civilians.
  • Ability to work independently and as a team member under tight deadlines with changing priorities.
  • Ability to mentor and lead a technical team to include functional management of direct reports
  • TS/SCI w/Polygraph required.
  • US Citizenship is required due to the nature of the government contracts we support.

Required Certifications:

  • GIAC Continuous Monitoring (GMON) or equivalent (CySA+, CCNA – Cyber Operations, CCIH)
  • DoD 8570 IAT Level III equivalent certification (with continuing education where applicable) (CASP, CCNP Security, CISA, CISSP, GCED, GCIH)
  • DoD 8570 CND Incident Responder/CSSP Incident Responder equivalent certification (CEH, CFR, CSA+, GCFA, GCIH, SCYBER)
  • Splunk Core Certified User


  • Bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field and 12+ years of prior relevant experience.

Preferred Qualifications:

  • Previous experience leading and managing an Incident Response team of 10+ staff in a large enterprise spanning unclassified and classified networks
  • Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework.
  • Advanced Splunk Certifications (Splunk Core Certified Power User, Splunk Enterprise Security Certified Admin, Splunk Certified Developer)
  • One or more of GMON, GCIH, GCFA certifications
  • Experience running IR functions in a high matrixed, multi-agency government entity
  • Experience developing and implementing IR response plans, playbooks, SOPs, and workflows
  • Experience hiring, maintaining, motivating, and retaining a highly technical and proficient IR team

Pay Range:

Pay Range $118,300.00 - $182,000.00 - $245,700.00

The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

About Leidos

Leidos is a Fortune 500® technology, engineering, and science solutions and services leader working to solve the world’s toughest challenges in the defense, intelligence, civil, and health markets. The company’s 44,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $13.7 billion for the fiscal year ended December 31, 2021. For more information, visit

Pay and Benefits

Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available here.

Securing Your Data

Beware of fake employment opportunities using Leidos’ name. Leidos will never ask you to provide payment-related information during any part of the employment application process (i.e., ask you for money), nor will Leidos ever advance money as part of the hiring process (i.e., send you a check or money order before doing any work). Further, Leidos will only communicate with you through emails that are generated by the automated system – never from free commercial services (e.g., Gmail, Yahoo, Hotmail) or via WhatsApp, Telegram, etc. If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at [email protected].

If you believe you are the victim of a scam, contact your local law enforcement and report the incident to the U.S. Federal Trade Commission.

Commitment to Diversity

All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws.

Apply Now    Save Job Saved

Related Opportunities

Talent Community

Join our Talent Community to create a profile, enabling a streamlined application process and to help our recruiters better understand your areas of expertise and interest.

Join our Talent Community