Join our talent network

Job #: TR-661724
Category: Cyber Security
Schedule (FT/PT): Full time
Travel Required: No
Shift: Day
Potential for Telework: No
Clearance Required: Top Secret/SCI
Referral Eligibility: Eligible
Group: Civil

Job Description:
is seeking a Tier 3 Cyber Threat Analyst to join our team on a highly visible
cyber security single-award IDIQ vehicle that provides security operations center
(SOC) support, cyber analysis, application development, and a 24x7x365 support

Department of Homeland
Security (DHS), Security Operations Center (SOC) Support Services is a US
Government program responsible to monitor, detect, analyze, mitigate, and
respond to cyber threats and adversarial activity on the DHS Enterprise.
The DHS SOC has primary responsibility for monitoring and responding to
security events and incidents detected at the Trusted Internet Connection (TIC)
and Policy Enforcement Point (PEP) and is responsible for directing and
coordinating detection and response activities performed by each Component SOC.
Direction and coordination are achieved through a new shared DHS incident
tracking system and other means of coordination and communication. Duties will include investigating computer and information security incidents to determine extent of compromise to information and automated information systems, providing computer forensic and intrusion support to high technology investigations in the form of computer evidence seizure, computer forensic analysis, data recovery, and network assessments, researching and maintaining proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption.In addition, the Tier 3 Analyst will lead and mentor other SOC Support Staff and will communicate with executive leadership regarding matters of significant importance to the DHS SOC Support Services Program. The Analyst should have expertise in at least one
of the following specialized areas: - Email security - Digital media forensic -
Monitoring and detection - Incident Response - Vulnerability assessment and pen
test - Cyber intelligence analysis Supports detection, containment, and
eradication of APT activities targeting customer networks. Process community
reporting, conduct link analysis, and collaborate with other Government cyber
fusion teams. Publish intelligence products to inform network defenders about
APT activities, new detection methods, among other topics of interest.

Will work a rotating shift consisting of three 12 hour shifts with four days off the first week of the pay period and three 12 hour
shifts, one 8 hour shift and 3 days off the second week of the pay period. LeadGenLeadGenCyberDHS Cyber
EDUCATION & EXPERIENCE: Requires Bachelors Degree in Computer Science, Engineering, Information
Technology, Cyber Security, or related field and 12 to 15 years of prior relevant experience or Masters with 10 to 13 years of prior relevant experience. May possess a Doctorate in technical domain. Prior relevant experience should be in the areas of incident detection and response, malware analysis, or cyber
forensics.Minimum of current Top Secret clearance with ability to
obtain TS/SCI Clearance. In addition to specific security clearance
requirements all Department of Homeland Security SOC employees are required to
obtain an Entry on Duty (EOD) clearance to support this program. In addition, minimum of 7 years of specialized experience in
one or more of the following areas:Email securityDigital media forensicMonitoring and detectionIncident ResponseVulnerability assessment and Pen TestCyber intelligence analysis Must have at least one of the following
Offensive Security: OSCP, OSCE, OSWP and OSEE EnCase: EnCE Dod 8570: IAT L3,
CNDSP Analyst or IR Carnegie Mellon: CCSIH" Extensive experience analyzing and synthesizing information
with other relevant data sources, providing guidance and mentorship to others
in cyber threat analysis and operations, evaluating, interpreting, and
integrating all sources of information, and fusing computer network attack
analyses with counterintelligence and law enforcement investigations.

DESIRED SKILLS: Experience in cyber government, and/or
federal law enforcement. Cyber Kill Chain knowledge. Office 365 monitoring (O365) experience

Leidos is a Fortune 500® information technology, engineering, and science solutions and services leader working to solve the world’s toughest challenges in the defense, intelligence, homeland security, civil, and health markets. The company’s 31,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $10.17 billion for the fiscal year ended December 29, 2017. (NYSE: LDOS) All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status.

Talent Community

Join our Talent Community to create a profile, enabling a streamlined application process and to help our recruiters better understand your areas of expertise and interest.

Join our Talent Community