Leidos is seeking a SOC Metrics Analyst on our GSMO II IDIQ contract’s Joint Service Provider (JSP) Cyber Security Task Order in Alexandria, VA. JSP provides a full range of IT products, services, and solutions and customer services to the Office of the Secretary of Defense (OSD), Chairman of the Joint Chiefs of Staff (CJCS) and the Joint Staff (JS), Director of Administration (DA), Pentagon Force Protection Agency (PFPA), Washington Headquarters Services (WHS), and other OSD offices for them to meet mission and business requirements. Through the JSP Cyber Security program, JSP performs a wide variety of services and functions required to secure the information security posture for DoD services.
As the SOC Metrics Analyst, you will provide analytical support services to SOC leadership to facilitate decision making by stakeholders of various levels from real time SOC analysts to executive leadership utilizing industry best practices. Analytical support services will be delivered through metrics analysis, metrics and dashboard development and documentation, internal and external reports, written and oral communication. Some remote work will be allowed. This position supports 8 hour shifts to support core hours 0600-1800 Monday - Friday and an active Secret security clearance (with TS/SCI eligibility) is required prior to start.
Responsibilities will include but not limited to:
Review and develop metrics related to the operation and maturation of the JSP SOC.
Work with large cybersecurity operations data sets and implement error checking, data quality assessments, queries.
Leverage automation to provide auto-generated reporting.
Recommend and support the development of new metrics and dashboards.
Develop and manage JSP SOC metrics catalog to track stakeholder requirements.
Recommend and track progress of KPIs.
Track and report on data spills and costs.
Develop written documentation and user guides for JSP SOC metrics dashboards.
Utilize metrics to support quality assurance and quality checking activities.
Upload documentation to the team knowledge management page for collaboration.
Prepare and provide information, presentations, and written reports for internal and external JSP SOC stakeholders as needed.
Active Secret clearance at minimum, with ability to obtain and maintain TS/SCI.
Bachelor's degree and 4+ years of prior relevant experience; additional work experience or Cyber courses/certifications may be substituted in lieu of degree.
Proficiency with standard Microsoft analytical software such as Excel or Access.
Hands on experience working with business intelligence software such as Tableau or Power BI.
Ability to assess and verify operational data from IDS/IPS, NetFlow, custom sensors, case/knowledge management system and communicate analytical results.
Excellent oral and written communications skills, including experience in writing documentation for extracting and normalizing data from tools and databases.
Familiarity with data visualization.
Ability to handle multiple tasks and deadlines.
Proficient with Microsoft Word.
Demonstrated sound understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements.
Motivated self-starter with ability to create complex technical reports on analytic findings.
DoD 8570 IAT level II or higher certification such as CompTIA Security+ CE, ISC2 SSCP, SANS GSEC prior to starting.
DoD 8570 CSSP-A level Certification such as CEH, CySA+, GCIA or other certification is required within 6 months of start.
Demonstrated commitment to training, self-study and maintaining proficiency in the technical cybersecurity domain and an ability to think and work independently
Strong analytical and troubleshooting skills.
Willing to support critical reporting for incidents and high visibility events which may include hours outside of core hours, including rare weekend hours.
Top Secret – Sensitive Compartmented Information (TS/SCI) Eligible (DIA Adjudicated or capable of reciprocal acceptance by DIA)
Demonstrated hands-on experience analyzing high volumes of logs, network data (e.g. Netflow, DNS, Proxy), and case data in support of metrics reporting.
In-depth knowledge of querying, normalizing, and visualizing data from at least one enterprise SIEM platform (e.g. ArcSight, Splunk, Nitro/McAfee Enterprise Security Manager, QRadar, LogLogic).
Scripting and programming experience to automate repetitive tasks and recurring work products and deliverables.
Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework.
CND experience (Protect, Detect, Respond and Sustain) within a Computer Incident Response organization.
Demonstrated understanding of the life cycle of network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs).
Pay Range:Pay Range $74,750.00 - $115,000.00 - $155,250.00
Leidos is a Fortune 500® technology, engineering, and science solutions and services leader working to solve the world’s toughest challenges in the defense, intelligence, civil, and health markets. The company’s 45,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $14.4 billion for the fiscal year ended December 30, 2022. For more information, visit www.Leidos.com.
Pay and Benefits
Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available here.
Securing Your Data
Beware of fake employment opportunities using Leidos’ name. Leidos will never ask you to provide payment-related information during any part of the employment application process (i.e., ask you for money), nor will Leidos ever advance money as part of the hiring process (i.e., send you a check or money order before doing any work). Further, Leidos will only communicate with you through emails that are generated by the Leidos.com automated system – never from free commercial services (e.g., Gmail, Yahoo, Hotmail) or via WhatsApp, Telegram, etc. If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at [email protected].
If you believe you are the victim of a scam, contact your local law enforcement and report the incident to the U.S. Federal Trade Commission.
Commitment to Diversity
All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws.