Are you someone concerned with the security of our nation? Are you driven to protect and serve? Are you skilled in cyber defense? Then Leidos is the place for you. We are ensuring our nation's security in a partnership with the Department of Homeland Security. Our partnership focuses on the DHS Security Operations Center (SOC) Support Services Program where we provide around the clock cyber support focusing on some our nation's toughest threats.
Leidos has an need for a talented Cyber Threat Intelligence Analyst to join our team on this highly visible cyber security single-award IDIQ vehicle that provides security operations center (SOC) support, cyber analysis, application development, and a 24x7x365 support staff.
The Cyber Threat Intel Analyst will need a strong cyber security background with experience with the following:
Identify, track and investigate high priority threat campaigns, malicious actors with the interest, capability and TTPs (Techniques, Tactics and Procedures).
Bring a comprehensive understanding, analyzing and tracking the cyber threat landscape, including identifying and analyzing cyber threats actors, APT TTPs and/or activities to enhance cyber security posture of an the organization's IT operating environment.
Must currently possess a Secret Clearance. In addition to clearance requirement, all DHS personnel must have or obtain a DHS CBP BI.
BS in IT related field or higher and 8+ years' experience or a Masters Degree and 6 years of related experience. Should have a minimum of 5 years of experience cyber security analyst performing intelligence analysis, collection management, and technical analysis.
Two years of recent experience with host-based and network based security monitoring solutions and to include security content recommendation or development (host based and network signatures).
Maintain and drive the development of new reports of Cyber Threat Intelligence analysis to peers, management and customer teams for purposes of situational awareness and making threat intelligence actionable.
Provide support to the Security Operations Center (SOC) during incident response and threat hunting activities that includes cyber threat analysis support, research, recommending relevant remediation and mitigation.
Conduct trending and correlation of various cyber intelligence sources for the purposes of indicator collection, shifts in TTPs, attribution and establishing countermeasures to increase cyber resiliency
Proficient in one more of the following computer languages Python, Bash, Visual Basic or Powershell in order to support cyber threat detection or reporting
Host-based and network based forensics related to the identification of advanced cyber threat activities, intrusion detection, incident response, malware analysis, and security content development (e.g., signatures, rules etc.); and cyber threat intelligence.
Will be responsible for developing scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts,
Python, C++, HTML, XML or other type most appropriate for the task.
Deep understanding of Cyber Kill Chain and applicable analytic models such the Diamond Model
Strong written and oral communication skills
Should have one of the following certifications: GCED, GCIA, GCFA, GPEN, GWAPT, GCFE, GREM, GXPN, GMON, GCIH, CCFP, CCSP, CISSP, CSIH, CHFI, LPT, ECSA, OSCP, OSCE, OSWP, OSEE, EnCE
Previous DOD, IC or Law Enforcement Intelligence or Counter Intelligence Training/Experience.
Knowledge of Structured Analytic Techniques