Leidos is looking for a Cyber Security Engineer to provide cyber leadership on a mission-critical program whose purpose is rapid response to cyber incidents and proactive monitoring for malicious cyber activity.
Requires experience in providing leadership and vision in incident handling, response, and analysis
Must be hands-on and have intimate knowledge and experience in cybersecurity, incident response, and analysis; digital forensics; security vulnerabilities/weaknesses and related attacks; network security issues, and encryption technologies
Responsible for planning and assignment of tasks, monitoring delivery, and work assignments.
Responsible for review of work products prior to delivery to the Government.
Support assessments of projected cyber risk; make predictions about threats to federal networks and critical infrastructure sectors, and conduct case studies.
Support the adoption and/or implementation of Federal and national standards or guidance to enhance training and skills development for the Federal workforce
Development and presentation of capability and technology roadmaps.
Support development and maintenance of Continuity of Operations (COOP) Plans and other operations planning documentation.
Provide technical assistance in the development of Business Impact Analyses (BIA), Business Continuity Plans (BCPs), and Disaster Recovery Plans (DRPs).
Provide engineering and technical support services to functional groups to include providing specific tool studies, systems analyses, testing and evaluation, and to supplement operational technical assistance as required.
Provide support to programming code reviews, determining system performance specifications, identifying and resolving interoperability problems, developing requirements, determining parameters, and resolving conflicts between disparate technologies as they arise.
Provide engineering and technical assistance support to include technical support for current, proposed, and potential cybersecurity related mission objectives.
Provide subject matter expertise to assist with matters to include strategies for improving resource allocation, alignment of work, and improving work-life balance for employees.
Bachelor's degree with 12 years of relevant experience or Master's degree with 10 years of relevant experience • 5 years of experience supervising or leading teams or projects, including management of teams of CND technicians to resolve CND incidents • Active Top Secret clearance with SSBI; Ability to obtain a TS/SCI clearance • Active CAP, GSLC, CISM, or CISSP certification
MINIMUM REQUIRED QUALIFICATIONS: • Demonstrated experience/knowledge of providing incident response and handling using established best practices/methodologies• Knowledge of general attack stages (e.g., foot printing and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks, etc.)• Demonstrated experience in recognizing and categorizing types of vulnerabilities and associated attacks• Knowledge of different operational threat environments (e.g., first generation [script kiddies], second generation [non-nation state sponsored], and third generation [nation state sponsored])• Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return-oriented attacks, and malicious code)• Bachelor's degree with 12 years of relevant experience or Master's degree with 10 years of relevant experience• 5 years of experience supervising or leading teams or projects• Active Top Secret clearance with SSBI; Ability to obtain a TS/SCI clearance• Active CAP, GSLC, CISM, or CISSP certificationADDITIONAL DESIRED QUALIFICATIONS: • Knowledge of the NCCIC National Cyber Incident Scoring System to be able to prioritize triaging of incident• Knowledge of basic system administration and operating system hardening techniques• Knowledge of CND policies, procedures, and regulations• Demonstrated strong operational expertise in one or more of the following CND tools: Splunk, Palo Alto, Network Firewalls, SourceFire/Cisco IPS, BRO, FireEye, AirTight and Solera.• Experience in identifying the root cause of an incident and recognize the key elements to investigate with the customer to get the root cause of an incident• Cyber operations management experience and responsibility leading cyber programs for government and/or commercial customers• Ability to quickly identify and coordinate staffing needs for surge and emergency operations• Knowledge of Cyber Operations including Incident Response, Hunt, Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA)• Experience coaching and leading cyber analysts and/or IT engineers• CND experience (Protect, Detect, Respond and Sustain) within a Computer Incident Response organization• In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g. Nitro/McAfee Enterprise Security Manager, ArcSight, QRadar, LogLogic, Splunk)• Experience and proficiency with any of the following: Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics• Other Active Cyber Certification(s), such as GIAC Penetration Tester (GPEN), GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), GIAC Certified Forensic Examiner (GCFE), GIAC Certified Forensic Analyst (GCFA), GIAC Reverse Engineering Malware (GREM), EnCase Certified Examiner (EnCE), GIAC Network Forensic Analyst (GNFA), GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Incident Handler (GCIH), etc.
External Referral Bonus:
Potential for Telework:
Clearance Level Required:
Yes, 25% of the time
Scheduled Weekly Hours: