To our valued Leidos candidates:

Coronavirus is on everyone's mind with the effects being felt around the world. The markets are volatile, and we're all concerned for the health and safety of our families, friends, and colleagues. Please know that we're taking all necessary measures to safeguard our employees, customers and the communities in which we live, including following all recommended best practices around social distancing.

With that in mind, in an abundance of caution, we are canceling all face to face career events, such as job fairs and open house events. In the coming days and weeks, we will be hosting career events virtually, using our online chat tools so that we may continue our hiring practice safely and securely. You can find available virtual career events at https://career-events.leidos.com.

We are using telephone meetings and online chats via Brazen to conduct interviews and hiring discussions, and we are offering options for video interviews so that you can have a virtual face to face meeting with your potential new leader. We do not conduct interviews or extend offers via text or chat based social media, such as WhatsApp or MySpace.

Leidos will never ask you to provide payment-related information at any part of the employment application process, nor will Leidos ever advance money as part of the hiring process. And Leidos will communicate with you only through emails that are generated by Leidos.com automated system. If you receive an email purporting to be from Leidos that asks for payment-related information or any other personal information, please report the email to Chris Scalia, Leidos’ Senior Vice President of Talent Acquisition, at [email protected].

As a company, as a country, as a world, we have confronted challenging moments before. We are confident that, guided by our values and the strength of our community as well as the commitment we have to the important work we do each day, we will find our way through this time together. We will do this with the care and concern for one another and the common good that defines. Please keep those impacted by the virus in your thoughts.

Close Window
Join our talent network

Job #: R-00059923
Location: Washington, US
Category: Cyber Operations
Schedule (FT/PT): Full Time
Travel Required: Yes, 25% of the time
Shift: Day
Potential for Telework: No
Clearance: Top Secret/SCI
Referral Eligibility: Eligible
Referral Bonus Amount: $5000
Group: Intelligence

Share: mail twitter linkedin

Description

Job Description:

Leidos is seeking a Lead Cyber Network Defense (CND) Detection Functional/Technical Consultant to join a team supporting a government customer in a highly complex cyber security environment. The successful candidate will manage a team ranging from 20-25 staff and work in a high-pressure environment, delivering outstanding results under tight deadlines and constraints. This role serves as a key co-leadership governance of the 24/7/365 SOC function for the customer. 

The Lead CND Detection Functional/Technical consultant will serve as the principle technical advisor and subject matter expert for CND Detection services. They will be an expert for enterprise incident detection. The Lead Detection consultant shall be a multi-functional individual with strong leadership and technical skills including but not limited to the following core detection concepts and capabilities; instrumenting security event IT infrastructure and application telemetry to detect threat patterns and/or indicators of attack; optimize data/event collection protocols, processing and monitoring workflows; utilize technical security tools to detect and monitor existing or newly deployed vulnerability systems; coordinate and orchestrate proactive and predictive threat hunting operations. The consultant shall understand the incident detection process. The candidate shall be familiar with the utilization, configuration, and implementation of industry standard cyber defense capabilities including but not limited to web content filters, email security capabilities, IDS, IPS, HBSS, SIEM, DNS security practices, advanced log analysis, network monitoring, network flow analysis, packet capture analysis, network proxies, firewalls, anti-virus capabilities, Linux/UNIX command line, and access control lists.

Candidates must understand the lifecycle of the network threats, attack vectors and methods of exploitation. Candidates should understand the incident response process in accordance with Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510.01 and other applicable DoD/IC directives and policies. They must understand the incident response processes and procedures to aid in the facilitation of comprehensive procedures for collaboration and incident escalation from other DCNDC functional teams.

Primary Responsibilities

Lead and direct enterprise cyber security detection functions at both the technical, operational day-to-day, and incident response events including but not limited to the following objectives and functional areas;

  • Lead a team of cyber professionals responsible for instrumenting enterprise wide security threat event telemetry and pattern recognition

  • Integrate security telemetry from the enterprise service fabric into SOC SIEM analysis and hunting platforms and capabilities

  • Integrate threat detection mechanisms with defensive countermeasures to add resilience to cyber attacks

  • Implement a meta-data foundation and data analysis capability which detects and alerts on malicious security event patterns

  • Design, implement and support detection of threats based on entity(device) and user behavior variances

  • Model, test, validate threat detection alerts serving as the basis for security event triage and investigation by SOC Analysts

  • Collaborate across all major SOC, Vulnerability Assessment, Audit/Compliance, Countermeasure, Fusion and Incident Response functions

  • Collaborate with the cyber security architecture and engineering teams to optimize security telemetry to enable high fidelity detection capabilities

  • Provide support and advisement on tuning security logging infrastructure to optimize detection capabilities and support SOC alerting and triage response functions

  • integrating threat detection protocols and security event telemetry to optimize proactive detection and hunting of threat patterns present from the enterprise service fabric

  • integration of proactive cyber threat intelligence signals with detection and alerting functions

  • play a key role in modeling, testing, validating and converting relevant adversarial threat alerts to production SOC alerts

Basic Qualifications

  • Previous experience leading and managing a team of 5+ staff responsible for supporting, configuring, architecting enterprise wide security telemetry logging

  • Serve as the technical Subject Matter Expert (SME) in leading a team of staff in the design, implementation, integration and operational support of cyber security layers delivering detection capabilities

  • Knowledge and experience instrumenting, configuring and integrating security event meta-data with SIEM platforms

  • Knowledge and application of transforming adversarial Tactics, Techniques and Protocols (TTPs) into proactive detection events

  • Established technical knowledge of the inter-workings of various security layers; IDS, IPS, HBSS, SEIM, DNS, Active Directory security practices, advanced log analysis, network monitoring, network flow analysis, packet capture analysis, network proxies, firewalls, anti-virus capabilities

  • Demonstrated understanding of the life cycle of network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs)

  • Technical experience with security event formats and inter-platform API integration

  • Directs multiple contractor and subcontractors teams through to project completion

  • BA/BS or equivalent experience and 12 – 15 years of prior relevant experience

Security Clearance

  • TS/SCI clearance and polygraph is required to be considered.

  • US Citizenship is required due to the nature of the government contracts we support.

Certifications

  • DoD 8570 compliance or information assurance certification commensurate with technical objectives and services required within the task order. Applicable software or hardware training and certifications commensurate with the technical objectives, services required, and IT environment specified within the task order

  • GCIH, CEH, GCFA, CHFI, GCED, CISSP, CISA

Preferred Qualifications:

  • In depth technical knowledge of security event meta-data structure, value and meaning when integrating detection functions into a SOC and SIEM

  • Experience designing, implementing and managing security event logging architectures and telemetry meta-data collection and analysis

  • Experience designing, implementing detection patterns and indicators of compromise aligned to TTPs and MITRE ATT&CK framework

External Referral Bonus:

Eligible

External Referral Bonus $:

5000

Potential for Telework:

No

Clearance Level Required:

Top Secret/SCI

Travel:

Yes, 25% of the time

Scheduled Weekly Hours:

40

Shift:

Day

Requisition Category:

Professional

Job Family:

Cyber Operations

Pay Range:

About Leidos

Leidos is a Fortune 500® information technology, engineering, and science solutions and services leader working to solve the world’s toughest challenges in the defense, intelligence, homeland security, civil, and health markets. The company’s 40,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $12.30 billion for the fiscal year ended January 1, 2021. For more information, visit www.Leidos.com.

Pay and Benefits

Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available here.

Securing Your Data

Leidos will never ask you to provide payment-related information at any part of the employment application process. And Leidos will communicate with you only through emails that are sent from a Leidos.com email address. If you receive an email purporting to be from Leidos that asks for payment-related information or any other personal information, please report the email to [email protected].

Commitment to Diversity

All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws.

   Save Job Saved

Talent Community

Join our Talent Community to create a profile, enabling a streamlined application process and to help our recruiters better understand your areas of expertise and interest.

Join our Talent Community