• Senior Incident Response Analyst

    LeidosAshburn, VA 20147

    Job #1566002893

  • Description

    Job Description:

    SIGN ON BONUS ELIGIBLE!

    Department of Homeland Security (DHS), Security Operations Center (SOC) Support Services is a US Government program responsible to monitor, detect, analyze, mitigate, and respond to cyber threats and adversarial activity on the DHS Enterprise. The DHS SOC has primary responsibility for monitoring and responding to security events and incidents detected at the Trusted Internet Connection (TIC) and Policy Enforcement Point (PEP) and is responsible for directing and coordinating detection and response activities performed by each Component SOC. Direction and coordination are achieved through a new shared DHS incident tracking system and other means of coordination and communication.

    Leidos is seeking a Tier 3 Incident Response Analyst to join our team on this highly visible DHS CBP SOC Program. The Senior Incident Response Analyst will perform the following:

    • Utilize state of the art technologies such as host forensics tools(FTK/Encase), Endpoint Detection & Response tools, log analysis (Splunk) and network forensics (full packet capture solution) to perform hunt and investigative activity to examine endpoint and network-based data.

    • Conduct malware analysis, host and network, forensics, log analysis, and triage in support of incident response.

    • Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis and incident response.

    • Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes.

    • Work with key stakeholders to implement remediation plans in response to incidents.

    • Effectively investigative and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership.

    • Flexible and adaptable self-starter with strong relationship-building skills

    • Strong problem solving abilities with an analytic and qualitative eye for reasoning

    • Ability to independently prioritize and complete multiple tasks with little to no supervision

    Minimum Requirements:

    • Bachelor's Degree in IT related field or higher and 8+ years' experience in an information technology field with a minimum of 7 years of experience in the areas of incident detection and response, malware analysis, or computer forensics.

    • Candidate must be able to obtain a CBP background investigation

    Must have at least one of the following certifications: SANS GIAC: GCIA, GCFA, GPEN GCFE, GREM, or GCIH ISC2 CCFP, CCSP, CISSP, CERT CSIH EC Council: CHFI, Offensive Security: OSCP, OSCE, OSWP and OSEE Encase: EnCE, DOD 8570: IAT L3, CNDSP Analyst or IR Carnegie Mellon: CSIH Desired skills:

    Ability to script in one more of the following computer languages Python, Bash, Visual Basic or Powershell

    Experience in Federal Government, DOD or Law Enforcement

    Cyber Kill Chain Knowledge

    External Referral Bonus:Eligible

    Potential for Telework:No

    Clearance Level Required:None

    Travel:No

    Scheduled Weekly Hours:40

    Shift:Day

    Requisition Category:Professional

    Job Family:Cyber Operations

    Pay Range: REQNUMBER: R-00055264

    All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status. Leidos will consider qualified applicants with criminal histories for employment in accordance with relevant Laws. Leidos is an equal opportunity employer/disability/vet.