Leidos
Incident Response Analyst
Leidos, Ashburn, Virginia, United States, 22011
DescriptionAt Leidos , we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customers' success. We empower our teams, contribute to our communities, and operate sustainable. Everything we do is built on a commitment to do the right thing for our customers, our people, and our community. Our Mission, Vision, and Values guide the way we do business.If this sounds like the kind of environment where you can thrive, keep reading!The Digital Modernization Sector
brings together our digital transformation and IT programs, allowing us to better serve our customers through scale and repeatability. Leidos has a critical need for a Incident Response Analyst to support the NOSC SOC.Primary ResponsibilitiesKnowledge of each phase of the Incident Response life cycle
Understanding of Operating Systems (Windows/Linux) operations and artifacts
Understanding of Enterprise Network Architectures to include routing/switching, common protocols (DHCP, DNS, HTTP, etc), and devices (Firewalls, Proxies, Load Balancers, VPN, etc)
Ability to recognize suspicious activity/events, common attacker TTPs, perform logical analysis and research to determine root cause and scope of Incidents
Drive implementation and improvement of new tools, capabilities, frameworks, and methodologies
Instill and reinforce industry best practices in the domains of incident response, cybersecurity analysis, case and knowledge management, and SOC operations
Promote and drive implementation of automation and process efficiencies
Familiarity with Cyber Kill Chain and ATT&CK Framework and how to leverage in Security Operations
Provide guidance and mentorship to improve analyst skill sets and ensure delivery of high quality analysis and work products
Establish trust and business relationships with customer and other relevant stakeholders
Basic QualificationsAll Incident Response Analyst candidates shall have a minimum of a bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, and 4-8 years of experience in incident detection and response, malware analysis, or cyber forensics. Additional education and certifications may be considered in lieu of a degree.
Must have TS/SCI. In addition to specific security clearance requirements, all Department of Homeland Security SOC employees are required to obtain an Entry on Duty (EOD) clearance to support this program.
understanding of core current cybersecurity technologies as well as emerging capabilities.
4+ years of intrusion detection and/or incident handling experience
CISSP or SANS GCIH or GCIA required upon start
Knowledge in planning, directing, and managing Computer Incident Response Team (CIRT) and/or Security Operations Center (SOC) operations for a large and complex Enterprise
Strong written and verbal communication skills, and the ability to create technical reports based on analytical findings.
Strong analytical and troubleshooting skills.
Preferred Qualifications
Hands-on cybersecurity experience (Protect, Detect, Respond and Sustain) within a Computer Incident Response organization including prior experience performing large-scale incident response.
Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs).
Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework.
Familiarity with Cloud concepts and experience performing monitoring and responding to threats in Cloud environments
Original Posting Date:
2024-11-13
While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.Pay Range:
Pay Range $81,250.00 - $146,875.00
The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
brings together our digital transformation and IT programs, allowing us to better serve our customers through scale and repeatability. Leidos has a critical need for a Incident Response Analyst to support the NOSC SOC.Primary ResponsibilitiesKnowledge of each phase of the Incident Response life cycle
Understanding of Operating Systems (Windows/Linux) operations and artifacts
Understanding of Enterprise Network Architectures to include routing/switching, common protocols (DHCP, DNS, HTTP, etc), and devices (Firewalls, Proxies, Load Balancers, VPN, etc)
Ability to recognize suspicious activity/events, common attacker TTPs, perform logical analysis and research to determine root cause and scope of Incidents
Drive implementation and improvement of new tools, capabilities, frameworks, and methodologies
Instill and reinforce industry best practices in the domains of incident response, cybersecurity analysis, case and knowledge management, and SOC operations
Promote and drive implementation of automation and process efficiencies
Familiarity with Cyber Kill Chain and ATT&CK Framework and how to leverage in Security Operations
Provide guidance and mentorship to improve analyst skill sets and ensure delivery of high quality analysis and work products
Establish trust and business relationships with customer and other relevant stakeholders
Basic QualificationsAll Incident Response Analyst candidates shall have a minimum of a bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, and 4-8 years of experience in incident detection and response, malware analysis, or cyber forensics. Additional education and certifications may be considered in lieu of a degree.
Must have TS/SCI. In addition to specific security clearance requirements, all Department of Homeland Security SOC employees are required to obtain an Entry on Duty (EOD) clearance to support this program.
understanding of core current cybersecurity technologies as well as emerging capabilities.
4+ years of intrusion detection and/or incident handling experience
CISSP or SANS GCIH or GCIA required upon start
Knowledge in planning, directing, and managing Computer Incident Response Team (CIRT) and/or Security Operations Center (SOC) operations for a large and complex Enterprise
Strong written and verbal communication skills, and the ability to create technical reports based on analytical findings.
Strong analytical and troubleshooting skills.
Preferred Qualifications
Hands-on cybersecurity experience (Protect, Detect, Respond and Sustain) within a Computer Incident Response organization including prior experience performing large-scale incident response.
Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs).
Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework.
Familiarity with Cloud concepts and experience performing monitoring and responding to threats in Cloud environments
Original Posting Date:
2024-11-13
While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.Pay Range:
Pay Range $81,250.00 - $146,875.00
The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.