To our valued Leidos candidates:

Coronavirus is on everyone's mind with the effects being felt around the world. The markets are volatile, and we're all concerned for the health and safety of our families, friends, and colleagues. Please know that we're taking all necessary measures to safeguard our employees, customers and the communities in which we live, including following all recommended best practices around social distancing.

With that in mind, in an abundance of caution, we are canceling all face to face career events, such as job fairs and open house events. In the coming days and weeks, we will be hosting career events virtually, using our online chat tools so that we may continue our hiring practice safely and securely. You can find available virtual career events at https://career-events.leidos.com.

We are using telephone meetings and online chats via Brazen to conduct interviews and hiring discussions, and we are offering options for video interviews so that you can have a virtual face to face meeting with your potential new leader. We do not conduct interviews or extend offers via text or chat based social media, such as WhatsApp or MySpace.

Leidos will never ask you to provide payment-related information at any part of the employment application process, nor will Leidos ever advance money as part of the hiring process. And Leidos will communicate with you only through emails that are generated by Leidos.com automated system. If you receive an email purporting to be from Leidos that asks for payment-related information or any other personal information, please report the email to Chris Scalia, Leidos’ Senior Vice President of Talent Acquisition, at [email protected].

As a company, as a country, as a world, we have confronted challenging moments before. We are confident that, guided by our values and the strength of our community as well as the commitment we have to the important work we do each day, we will find our way through this time together. We will do this with the care and concern for one another and the common good that defines. Please keep those impacted by the virus in your thoughts.

Close Window
Join our talent network

Job #: R-00071031
Location: Alexandria, VA
Category: Cyber Security Research and Development
Schedule (FT/PT): Full Time
Travel Required: Yes, 10% of the time
Shift: Day
Potential for Telework: Yes, 25%
Clearance: Secret
Referral Eligibility: Eligible
Referral Bonus Amount: $5000
Group: Defense

This job posting is no longer active.

Share: mail twitter linkedin

Description

Job Description:

The Defense Group at Leidos has an exciting opportunity as a Vulnerability Assessment Operator and Researcher on our GSMO II IDIQ contract’s Joint Service Provider (JSP) Cyber Security Task Order in Alexandria, VA. JSP provides a full range of IT products, services, and solutions and customer services to the Office of the Secretary of Defense (OSD), Chairman of the Joint Chiefs of Staff (CJCS) and the Joint Staff (JS), Director of Administration (DA), Pentagon Force Protection Agency (PFPA), Washington Headquarters Services (WHS), and other OSD offices for them to meet mission and business requirements. Through the JSP Cyber Security program, JSP performs a wide variety of services and functions required to secure the information security posture for DoD services.

This Task Order has 100+ FTEs working to ensure JSP’s Cyber Security program adheres to JSP, DoD, and National Institute of Standards and Technology (NIST) approved cyber society, information assurance (IA) architecture, policies, programs, standards, and guidelines.  The Vulnerability Assessment Operator will exercise a Vulnerability Assessment Program to test and evaluate the effectiveness of JSP and its customers’ IT security posture. 

The Vulnerability Assessment Operator and Researcher will exercise a Vulnerability Assessment Program to test and evaluate the effectiveness of JSP and its customers’ IT security posture in accordance with CJCSI 6510.01F, CJCSM 6510.03, and National Institute of Standards and Technology (NIST) 800-115.  The Vulnerability Assessment Operator will perform internal security testing and find vulnerabilities which are not found using standard vulnerability assessment tools. The Vulnerability Assessment Operator will assess and determine exploitability of any asset on the Pentagon backbone in which JSP is the Authorizing Official; this includes servers, workstations, (e.g., Windows, Unix, and Linux), network devices (e.g., routers, switches, VTC), storage devices, (e.g., fiber channel switches, network attached storage, storage controllers), applications, (e.g., web, database, email, file transfer protocol (FTP), secure shell (SSH)), and security devices (e.g., firewalls, intrusion detection systems, web content filters).  In support of these missions, the operator shall provide support in the following areas in between mission engagements as requested: 
• Creation and maintenance of team documentation
• Creation, maintenance, and testing of custom team developed tools and scripts
• Tool research and testing in accordance with team SOPs
• Research and development of current and emerging exploitation technologies
• Peer review of team documentation and reports.

Responsibilities:

Offensive development responsibilities include vulnerability research and analysis, reverse engineering threats to determine methods of exploitation, malware research, research innovative tools and techniques, developing malicious payloads, and manipulating code execution. To include:

(1) Conduct operations to create and maintain operational cyber intelligence for defense and prevention teams.

(2) Provide technical expertise and distribute information for the incident response team.

(3) Identify and de-conflict friendly cyber engagements.

(4) Conduct any necessary offensive counter-intelligence activities.

(5) Provide technical expertise and distribute information for the Insider Threat program

The Vulnerability Assessment Operator and Researcher will exercise a Vulnerability Assessment Program to test and evaluate the effectiveness of JSP and its customers’ IT security posture in accordance with CJCSI 6510.01F, CJCSM 6510.03, and National Institute of Standards and Technology (NIST) 800-115. 

The Vulnerability Assessment Operator will perform internal security testing and find vulnerabilities which are not found using standard vulnerability assessment tools.

The Vulnerability Assessment Operator will assess and determine exploitability of any asset on the Pentagon backbone in which JSP is the Authorizing Official; this includes servers, workstations, (e.g., Windows, Unix, and Linux), network devices (e.g., routers, switches, VTC), storage devices, (e.g., fiber channel switches, network attached storage, storage controllers), applications, (e.g., web, database, email, file transfer protocol (FTP), secure shell (SSH)), and security devices (e.g., firewalls, intrusion detection systems, web content filters).  In support of these missions, the operator shall provide support in the following areas in between mission engagements as requested:

• Creation and maintenance of team documentation

• Creation, maintenance, and testing of custom team developed tools and scripts

• Tool research and testing in accordance with team SOPs

• Research and development of current and emerging exploitation technologies

• Peer review of team documentation and reports.

This role will be based onsite in Alexandria, VA and an active Secret security clearance is required prior to start.
 

Basic Qualifications:

  • Bachelor’s degree in IT-related field and 8+ years of relevant experience; additional experience may be considered in lieu of degree

  • Knowledge in computer and network forensics. 

  • Experience with vulnerability assessments/penetration tests of information systems. 

  • Proficiency in tools, techniques, countermeasures, and trend in computer and network vulnerabilities, data hiding, and encryption.

  • Should be technically proficient in the art of ethical hacking and penetration testing and should have experience using testing frameworks like Kali Linux, Metasploit, and Cobalt Strike.  

  • Should be knowledgeable of a variety of operating systems such as Windows workstations, Windows servers, and Unix/Linux and be able to navigate systems from the command line.

  • DoD 8570 IAT Level II certification required prior to start.

  • DoD 8570 CSSP Infrastructure Support certification required prior to start.

  • An active Secret security clearance is required prior to start.

GSMO

External Referral Eligible

tn10

Pay Range:

COVID Response

In order to enter Leidos facilities in the U.S. and to attend Leidos events outside our facilities, employees are required to be vaccinated for COVID-19 or maintain proof of a negative COVID-19 test within 96 hours of entry. In addition, we are receiving guidance from certain customers that onsite contractor personnel will need to be fully vaccinated to access customer facilities. If you are not vaccinated, please consider getting your COVID-19 vaccination as soon as possible. If you have any questions, please contact your Talent Acquisition POC. 

About Leidos

Leidos is a Fortune 500® information technology, engineering, and science solutions and services leader working to solve the world’s toughest challenges in the defense, intelligence, civil, and health markets. The company’s 43,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $12.30 billion for the fiscal year ended January 1, 2021.  For more information, visit www.Leidos.com.

Pay and Benefits

Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available here.

Securing Your Data

Leidos will never ask you to provide payment-related information at any part of the employment application process. And Leidos will communicate with you only through emails that are sent from a Leidos.com email address. If you receive an email purporting to be from Leidos that asks for payment-related information or any other personal information, please report the email to [email protected].

Commitment to Diversity

All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws.

This job posting is no longer active.

Talent Community

Join our Talent Community to create a profile, enabling a streamlined application process and to help our recruiters better understand your areas of expertise and interest.

Join our Talent Community