To our valued Leidos candidates:

Coronavirus is on everyone's mind with the effects being felt around the world. The markets are volatile, and we're all concerned for the health and safety of our families, friends, and colleagues. Please know that we're taking all necessary measures to safeguard our employees, customers and the communities in which we live, including following all recommended best practices around social distancing.

With that in mind, in an abundance of caution, we are canceling all face to face career events, such as job fairs and open house events. In the coming days and weeks, we will be hosting career events virtually, using our online chat tools so that we may continue our hiring practice safely and securely. You can find available virtual career events at https://career-events.leidos.com.

We are using telephone meetings and online chats via Brazen to conduct interviews and hiring discussions, and we are offering options for video interviews so that you can have a virtual face to face meeting with your potential new leader. We do not conduct interviews or extend offers via text or chat based social media, such as WhatsApp or MySpace.

Leidos will never ask you to provide payment-related information at any part of the employment application process, nor will Leidos ever advance money as part of the hiring process. And Leidos will communicate with you only through emails that are generated by Leidos.com automated system. If you receive an email purporting to be from Leidos that asks for payment-related information or any other personal information, please report the email to Chris Scalia, Leidos’ Senior Vice President of Talent Acquisition, at [email protected].

As a company, as a country, as a world, we have confronted challenging moments before. We are confident that, guided by our values and the strength of our community as well as the commitment we have to the important work we do each day, we will find our way through this time together. We will do this with the care and concern for one another and the common good that defines. Please keep those impacted by the virus in your thoughts.

Close Window
Join our talent network
Skip to main content

Job #: R-00106672
Location: Pensacola, FL
Category: Cyber Operations
Schedule (FT/PT): Full Time
Travel Required: No
Shift: Day
Remote Type: No Remote
Clearance: Top Secret/SCI
Referral Eligibility: Eligible
Referral Bonus Amount: $5,000
Group: Intelligence

This job posting is no longer active.

Share: mail twitter linkedin

Description

Job Description:

The Intelligence Group (IG) is looking for a Security Operations Center (SOC) Manager to support the DHS’s ACTS Program.  This position is responsible for leading the Security Operations Center CISA in Pensacola, Florida.  The SOC consists of a variety of highly-skilled, technical staff performing Monitoring and Analysis, Cyber Incident Handling, Threat Intelligence & Hunting, non-compliance reporting, user activity monitoring, malware and forensic analysis, vulnerability assessments and penetration testing of on-prem and cloud environments. Furthermore, the SOC Manager coordinates 24x7 staffing to support mission-critical operations, including incident response, and manages surge support.

Primary Responsibilities

  • Plan, direct, and manage day-to-day activities across the Security Operations Center
  • Drive implementation and improvement of new tools, capabilities, frameworks, and methodologies across all teams within the SOC
  • Accountable for the timeliness and efficiency of identification, isolation, mitigation, and reporting of critical incidents by the SOC
  • Instill and reinforce industry best practices in the domains of incident response, cybersecurity analysis, knowledge management, and SOC operations
  • Familiarity with Cloud concepts and experience performing monitoring and responding to threats in Cloud environments.
  • Promote and drive implementation of automation and process efficiencies
  • Validate continual improvement and technical advances
  • Maintain a forward-leaning ops tempo that includes continual validation and improvement across all SOC functions.
  • Maintain situational awareness of escalated events and alerts, tools status, vulnerability status, forensics and malware investigations, intelligence status, and all other SOC functions
  • Experience reporting on SOC activities and deliver SOC recommendations in accordance with government and contractual requirements
  • Provide customers with remediation recommendations
  • Create, review, and approve new procedural documentation

Basic Qualifications

  • CISSP and SANS GCIH or GCIA required upon start.
  • Advanced knowledge in planning, directing, and managing Computer Incident Response Team (CIRT) and/or Security Operations Center (SOC) operations for a large and complex Enterprise.
  • Significant experience supervising and leading employees of various labor categories and technical skill levels in efforts similar in size and scope to a mature Security Operation
  • Mature understanding of industry accepted standards for incident response actions and best practices related to SOC operations.
  • Strong written and verbal communication skills, and the ability to create technical reports based on analytical findings.
  • Strong analytical and troubleshooting skills.
  • 4+ years of supervising and/or managing teams.
  • 5+ years of intrusion detection and/or incident handling experience

Candidate must have Master with 20 years of prior relevant experience. 

Candidate must have an active TS/SCI

Preferred Qualifications

 

  • Deep technical understanding of core current cybersecurity technologies as well as emerging capabilities.
  • Hands-on cybersecurity experience (Protect, Detect, Respond and Sustain) within a Computer Incident Response organization including prior experience performing large-scale incident response.
  • Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs).
  • Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework.
  • Familiarity with Cloud concepts and experience performing monitoring and responding to threats in Cloud environments.
  • Familiarity with the Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA) National Cyber Incident Scoring System (NCISS)
  • Familiarity with identifying High Value Assets (HVAs) and coordinating enhanced cyber response actions required to protect and return these HVAs to service in the event of an outage

Pay Range:

Pay Range $142,350.00 - $219,000.00 - $295,650.00

The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

About Leidos

Leidos is a Fortune 500® technology, engineering, and science solutions and services leader working to solve the world’s toughest challenges in the defense, intelligence, civil, and health markets. The company’s 46,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $14.4 billion for the fiscal year ended December 30, 2022.  For more information, visit www.Leidos.com.

Pay and Benefits

Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available here.

Securing Your Data

Beware of fake employment opportunities using Leidos’ name. Leidos will never ask you to provide payment-related information during any part of the employment application process (i.e., ask you for money), nor will Leidos ever advance money as part of the hiring process (i.e., send you a check or money order before doing any work). Further, Leidos will only communicate with you through emails that are generated by the Leidos.com automated system – never from free commercial services (e.g., Gmail, Yahoo, Hotmail) or via WhatsApp, Telegram, etc. If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at [email protected].

If you believe you are the victim of a scam, contact your local law enforcement and report the incident to the U.S. Federal Trade Commission.

Commitment to Diversity

All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws.

This job posting is no longer active.

Related Opportunities

Talent Community

Join our Talent Community to create a profile, enabling a streamlined application process and to help our recruiters better understand your areas of expertise and interest.

Join our Talent Community