To our valued Leidos candidates:

Coronavirus is on everyone's mind with the effects being felt around the world. The markets are volatile, and we're all concerned for the health and safety of our families, friends, and colleagues. Please know that we're taking all necessary measures to safeguard our employees, customers and the communities in which we live, including following all recommended best practices around social distancing.

With that in mind, in an abundance of caution, we are canceling all face to face career events, such as job fairs and open house events. In the coming days and weeks, we will be hosting career events virtually, using our online chat tools so that we may continue our hiring practice safely and securely. You can find available virtual career events at https://career-events.leidos.com.

We are using telephone meetings and online chats via Brazen to conduct interviews and hiring discussions, and we are offering options for video interviews so that you can have a virtual face to face meeting with your potential new leader. We do not conduct interviews or extend offers via text or chat based social media, such as WhatsApp or MySpace.

Leidos will never ask you to provide payment-related information at any part of the employment application process, nor will Leidos ever advance money as part of the hiring process. And Leidos will communicate with you only through emails that are generated by Leidos.com automated system. If you receive an email purporting to be from Leidos that asks for payment-related information or any other personal information, please report the email to Chris Scalia, Leidos’ Senior Vice President of Talent Acquisition, at [email protected].

As a company, as a country, as a world, we have confronted challenging moments before. We are confident that, guided by our values and the strength of our community as well as the commitment we have to the important work we do each day, we will find our way through this time together. We will do this with the care and concern for one another and the common good that defines. Please keep those impacted by the virus in your thoughts.

Close Window
Join our talent network
Skip to main content

Job #: R-00074880
Location: Suitland, MD
Schedule (FT/PT): Full Time

This job posting is no longer active.

Share: mail twitter linkedin

Description

Job Description:

Are your ready for your next challenge?

We are in search for a Computer Network Defense (CND) Security Engineer - Active TS/SCI Required to work at our customer site at the National Maritime Intelligence Center, Suitland, MD. In this role you will provide operations, engineering, and technical support services and associated supplies to support certain Amazon Web Services resources, Red Hat Enterprise Linux servers, Splunk software, Python scripting language, REGEX parsing, and .xml presentation format development, architecture, administration, and Risk Management Framework (RMF) requirements and operations of the Hopper ISC CYBERDEP Security Information Event Management and NAVINTEL Enterprise Audit Capability (SIEM/NEAP).  

Note: To be considered, must have an active Top Secret/SCI clearance


 

THE MISSION

The Hopper Information Services Center (ISC) is an IT service provider for the Office of Naval Intelligence (ONI) and for 70+ Navy Intelligence Community (IC) ashore organizations across the globe with the mission to deploy and operate classified information systems, networks, communications systems, and cybersecurity capabilities.  Within Hopper ISC, the Cybersecurity Department (CYBRDEP) is comprised of four divisions (Defensive Cybersecurity Operations [N62], Cybersecurity Mission Operations [N63], Assessment & Validation [N64], and Cybersecurity Engineering [N66]), and these divisions collectively secure, protect, assess, and monitor fielded Information Technology (IT) capabilities against a full range of internal and external threats.

Security Information Event Management (SIEM) platforms support threat detection, compliance, and security incident management through the collection and analysis (both near real-time and historical) of security events, as well as a wide variety of other event and contextual data sources. The core capabilities are a broad scope of log event collection and management, the ability to analyze log events and other data across disparate sources, and operational capabilities (such as incident management, dashboards, and reporting). Enterprise Audit is an activity that “provides authorized personnel with the ability to review and examine any action that can potentially cause access to, generation of, or affect the release of classified or sensitive information.”  

If this sounds like the kind of environment where you can thrive, keep reading!

THE CHALLENGE (primary responsibilities)

* Provide assistance and direction to the Hopper Information Services Center in deploying, developing, maintaining, operating, administering, and supporting the technology capable of SIEM ingest and display as well as automating auditing in accordance with ICS-500-27 to identify, record, and report anomalous user activities that might be indicative of potential compromises of classified or sensitive information.

* Act as the subject matter expert (SME) in a Security Engineer capacity and participate in meetings, working groups, system demonstrations, and conferences in support of the effort. Consider and present various alternatives for implementation including identification and prioritization of resource requirements, the cost for additional tools, timeframe for implementation, and risks.

* Coordinate across IT domains and multiple teams (internal and external) and influence Hopper ISC regarding solution design, process and/or approaches to ensuring all SIEM and EAC systems are up-to-date, working efficiently and ensure all mission requirements are met.

* Build, configure, implement, develop, and maintain the NAVINTEL Enterprise Audit Capability (EAC), which currently consists of Splunk Enterprise, Splunk Enterprise Security, and a Filtered Audit Data (FAD) Distribution Point (DP) to support both the transmitting and receiving of audit data to and from the EAC.

* Implement custom integrated case management and workflows within Splunk Enterprise Security to identify, categorize, and if needed, escalate events of interest and manage event data streams flowing into the EAC.

* Implement Network and Asset Models to support audit community groups with applicable views to allow for the analysis of audit data specific to a group’s mission area and configure audit notification and alerts in accordance with defined thresholds and severity levels.

* Provide documentation to support the design, development, integration, configuration, installation, administration, operations, security assessment, and authorization, and disaster recovery of the EAC.

* Configure forwarders to properly configure/send log data to indexers information from NAVINTEL endpoint log file data of customer interest as well as audit event data according to CIM or a documented EAP schema.

* Perform, in support of real-time incident response, analysis of NAVINTEL endpoint log file data of customer interest as well as audit event data and alerts to configure dashboards and saved queries which would identify anomalous/suspicious activity, possible policy or security violations and the individuals responsible, and other network or systemic risks and vulnerabilities.

* Provide analysis and assessment results to the Government and make recommendations to resolve identified discrepancies, evaluating existing rule sets, and tuning, modifying, or developing existent/new search/dashboard/rule sets to achieve program objectives.

MINIMUM QUALIFICATIONS

*Active TS/SCI clearance

*Must possess a CASP+CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH or CCSP

*An OS-specific (Linux) administration certification 

*8+ years experience administering Splunk Enterprise, configuring Splunk Forwarders and Heavy Forwarders, and working with system administrators to install Universal Forwarders and configure .conf files to pick up logs from non-standard file locations.

*8+ years experience configuring and maintaining Splunk deployment servers to ensure customer log data is properly flowing in, creating indexes within Splunk, maintaining hot/warm/cold/frozen bucket health for target retention timeframes.

*8+ years experience installing, configuring, and utilizing Splunk Apps and Add-ons for various technologies within the Enterprise, working with system administrators to generate and ingest the proper data needed to make those Apps and Add-Ons work, and creating useful Splunk saved queries and dashboards based on customer input.

*5+ years or more experience administering Splunk Enterprise Security, formatting incoming log data to be indexed according to a documented .xml schema, making incoming log data CIM compliant, and formatting collected log data into a useful form for Splunk Enterprise security and other automated Audit/Anomaly Threat Detection technology.

*Experience configuring Splunk Universal Forwarders, Forwarders, and Heavy Forwarders, creating indexes within Splunk, formatting incoming log data to be indexed according to a documented schema, creating useful Splunk saved queries and dashboards based on customer input, and enhancing the use of log sources to conduct such work.

*Experience configuring and maintaining Splunk deployment servers to ensure customer log data is properly flowing in, creating indexes within Splunk, maintaining hot/warm/cold/frozen bucket health for target retention timeframes.

*Experience installing, configuring, and utilizing Splunk Apps and Add-ons for various technologies within the Enterprise, working with system administrators to generate and ingest the proper data needed to make those Apps and Add-Ons work, and creating useful Splunk saved queries and dashboards based on customer input.

*Experience administering Splunk Enterprise Security, formatting incoming log data to be indexed according to a documented .xml schema, making incoming log data CIM compliant, and formatting collected log data into a useful form for Splunk Enterprise security and other automated Audit/Anomaly Threat Detection technology.

*Demonstrable experience with integrating and analyzing multiple security-relevant data sources.

*Demonstrable experience in generating reports of such analysis, and briefing other team members and/or senior management on analytical findings.


 

Pay Range:

Pay Range $74,750.00 - $115,000.00 - $155,250.00

The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

#Featuredjob

About Leidos

Leidos is a Fortune 500® technology, engineering, and science solutions and services leader working to solve the world’s toughest challenges in the defense, intelligence, civil, and health markets. The company’s 47,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $14.4 billion for the fiscal year ended December 30, 2022.   For more information, visit www.Leidos.com.

Pay and Benefits

Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available here.

Securing Your Data

Beware of fake employment opportunities using Leidos’ name. Leidos will never ask you to provide payment-related information during any part of the employment application process (i.e., ask you for money), nor will Leidos ever advance money as part of the hiring process (i.e., send you a check or money order before doing any work). Further, Leidos will only communicate with you through emails that are generated by the Leidos.com automated system – never from free commercial services (e.g., Gmail, Yahoo, Hotmail) or via WhatsApp, Telegram, etc. If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at [email protected].

If you believe you are the victim of a scam, contact your local law enforcement and report the incident to the U.S. Federal Trade Commission.

Commitment to Diversity

All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws.

This job posting is no longer active.

Related Opportunities

Talent Community

Join our Talent Community to create a profile, enabling a streamlined application process and to help our recruiters better understand your areas of expertise and interest.

Join our Talent Community