Join our talent network

Job #: R-00017289
Location: Stuttgart
Category: Cyber Security
Schedule (FT/PT): Full Time
Travel Required: Yes, 10% of the time
Shift: Day
Potential for Telework: No
Clearance Required: Top Secret/SCI
Referral Eligibility: Eligible
Group: Defense

Description

Job Requisition:

Cyber Security Analyst

Job Description:

Are you interested in continuing your career in Europe in a mission focused environment? Leidos has established upcoming positions throughout the European theater supporting multiple customers for the Department of Defense. We are looking for experienced, innovative and motivated IT Specialists to support enablement of AFRICOM’s mission objectives.

What You’ll Get to Do:

Leidos has an excellent opportunity for an experienced, self-directed, Cyber Security Analyst.  This position is in support of a Department of Defense (DoD) organization, US AFRICOM located OCONUS in Stuttgart, Germany.  This position is required to travel OCONUS.  

The successful candidate must be able to communicate clearly and succinctly both written and orally, and present products and ideas in a business-like manner. The candidate will be required to work in dynamic fast paced environments that require team interaction and coordination of efforts.  The candidate must be experienced in interfacing with both client managers and system users.

The Cyber Security Analyst will provide technical expertise to support the Combatant Command (CCMD) cybersecurity program and its functions IAW current architectures which includes all hardware and software tools and sensors from perimeter to endpoint.  Provides Information Security Controls and guidelines to nodes and network management systems. Maintains network/system access and password controls. Collates and analyzes audit trail data. Reviews security threats and determines/implements effective countermeasures IAW established policies/regulations/directives. Analyzes network or system changes/reconfigurations for security impacts (performs risk analysis/assessment). Test and evaluate software security patches and security related configuration changes for compatibility with the current baseline and resolve any conflicts prior to deployment. Monitor implemented security controls and report status. Perform periodic and on-demand scans for vulnerabilities and unauthorized software on all CCMD assets using provided tools and provide results for review. Maintain scanning results and develop vulnerability trend results. Compile information and support required cyber evaluations, inspections, assessments, and reporting tasks. Perform incident response actions including, but not limited to, system isolation, data gathering, evidence handling, and reporting. Develop recommendations for counter measures or process improvement based on lessons learned from security incidents. Audit logs and provide reports as required. Other duties as assigned.

Provide exceptional technical expertise to support the Combatant Command (CCMD) cybersecurity program and its functions IAW current architectures which includes all hardware and software tools and sensors from perimeter to endpoint.  Provides Information Security Controls and guidelines to nodes and network management systems. Maintains network/system access and password controls. Collates and analyzes audit trail data. Reviews security threats and determines/implements effective countermeasures IAW established policies/regulations/directives. Analyzes network or system changes/reconfigurations for security impacts (performs risk analysis/assessment). Test and evaluate software security patches and security related configuration changes for compatibility with the current baseline and resolve any conflicts prior to deployment. Monitor implemented security controls and report status. Perform periodic and on-demand scans for vulnerabilities and unauthorized software on all CCMD assets using provided tools and provide results for review. Maintain scanning results and develop vulnerability trend results. Compile information and support required cyber evaluations, inspections, assessments, and reporting tasks. Perform incident response actions including, but not limited to, system isolation, data gathering, evidence handling, and reporting. Develop recommendations for counter measures or process improvement based on lessons learned from security incidents. Audit logs and provide reports as required. Other duties as assigned.

More About the Role:

The successful candidate must be able to communicate clearly and succinctly both written and orally, and present products and ideas in a business-like manner.  The candidate will be required to work in dynamic fast paced environments that require team interaction and coordination of efforts.  The candidate must be experienced in interfacing with both client managers and system users.

Operate tools and systems that are required to support the Command's cybersecurity program. Support to Blue Coat, Splunk, CyberArk, and BitLocker. Conduct Enterprise Logging. Report potential cybersecurity incidents, perform incident actions, and report status. Support HBSS services.  Provide STIG Assessment. Support ACAS Scanning. Support command security assessments.

Assist in the enhancement of AFRICOM's Cyber Threat Capability.

Provide focused operations/threat analysis on known intrusion sets. Discovering, tracking, reporting, and fusing global network events of interest. Apply subject matter expertise in adversarial methodologies in the cyber domain, and participate in OPTs. Develop and deliver specific deliverables associated with this support that are identified by the Government to include but not limited to Weekly Reports, Cyber Tippers, Briefings, Network Analytical Reports, ad hoc, and SPOT reports.

Additionally, the Cyber Security Analyst will provide remote support and/or travel to customer sites as required.


You’ll Bring These Qualifications:

  • Currently hold an adjudicated Top Secret/SCI Clearance and be able to maintain
  • BA/BS + 3 years recent specialized or AA/AS +5 years recent specialized or a major cert +7 years recent specialized or years of recent specialized experience
  • DOD 8570 IAM II compliance
  • CEH, CRISC, GSEC
  • Working knowledge of supporting Operating Systems: Windows Server 2008-2016 and Windows 10, VMWare vSphere, Solaris 10-11, Red Hat Enterprise Linux
  • Demonstrate expert knowledge in network access control, intrusion prevention and detection systems, firewalls, routers, incident response, information security methods, and risk management
  • In-depth experience with DoD IT security requirements
  • TESA eligibility

These Qualifications Would be Nice to Have:

  • ITIL v3 – Foundation
  • Experience with Bluecoat, McAfee HBSS, Splunk, CyberArk and Bitlocker, ACAS
  • Automation using Microsoft PowerShell, VBScript, or batch files
  • Adaptable to changing circumstances and operational needs
  • Understanding of Department of Defense Military standards

CITS III

External Referral Eligible

External Referral Bonus:

Eligible

Potential for Telework:

No

Clearance Level Required:

Top Secret/SCI

Travel:

Yes, 10% of the time

Scheduled Weekly Hours:

40

Shift:

Day

Requisition Category:

Professional

Job Family:

Cyber Security

2000

Defense

Leidos is a Fortune 500® information technology, engineering, and science solutions and services leader working to solve the world's toughest challenges in the defense, intelligence, homeland security, civil, and health markets. The company's 33,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $10.19 billion for the fiscal year ended December 28, 2018. For more information, visit www.Leidos.com.

Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available here.

Leidos will never ask you to provide payment-related information at any part of the employment application process. And Leidos will communicate with you only through emails that are sent from a Leidos.com email address. If you receive an email purporting to be from Leidos that asks for payment-related information or any other personal information, please report the email to spam.leidos@leidos.com.

All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws.

Talent Community

Join our Talent Community to create a profile, enabling a streamlined application process and to help our recruiters better understand your areas of expertise and interest.

Join our Talent Community