Digital Forensics Lead Cyber Analyst

Job Number:
Job Category:
Cyber Security
Yes, 25% of the time
Day Job
Potential for Teleworking:
Clearance Level Must Currently Possess:
Top Secret
Clearance Level Must Be Able to Obtain:
Top Secret/SCI
Leidos is looking for a Lead Cyber Analyst to provide cyber hunt leadership on a mission-critical program whose purpose is rapid response to cyber incidents and proactive monitoring for malicious cyber activity. This Lead will perform network and host-based cyber defense and hunt, incident response, containment, remediation, and asset recovery efforts, working with Government, private sector, and international constituents and partners. The lead is responsible to guide the efforts of a team of cyber analysts, including subcontractors, supporting the Government in day-to-day cyber hunt operations, analysis, remediation, and countermeasures to protect and defend critical infrastructure. Responsibilities include:
•Lead the Hunt Support Team to provide timely response to customer requests for assistance in cyber activities: hunt, intelligence analysis, data fusion, and countermeasures to protect national critical infrastructure under NCCIC purview
•Provide threat analyses, mitigation/countermeasure recommendations, after action reports, summaries, and other situational awareness information to customer and other stakeholders
•Develop Tactics, Techniques, and Procedures (TTPs) establishing reporting criteria, structure, and operational reports
•Provide technical support, analysis, and recommendations in areas such as: Surveillance and Reconnaissance; Perimeter Defense; Malicious Software (Malware) Analysis; Attack vector analysis; Computer Network Defense (CND); Incident Handling; Vulnerability Management/ Reporting; Risk Analysis and Readiness; Strategic Planning Analysis
•Participate in inter-agency sponsored community of interest analysis groups, conduct and participate in technical briefings and exchanges
•Conduct peer reviews and provides quality assurance reviews for junior personnel
•Oversee technical analysis by mentoring/providing guidance to others on data collection, analysis and reporting in support of HIRT engagements
•25% travel required; occasional international travel may be required

•Knowledge of attack stages (e.g., footprinting and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks, etc.)
•Knowledge and Understanding in preserving evidence integrity according to standard operating procedures or national standards
•Demonstrated experience serving as technical expert and liaison to customer and stakeholders
•Demonstrated experience of strong operational expertise in one or more of the following CND tools: Splunk, Palo Alto, Network Firewalls, SourceFire/Cisco IPS, BRO, FireEye, AirTight and Solera.
•Bachelor’s degree with 12 years of relevant experience or Master’s degree with 10 years of relevant experience
•5 years of experience supervising or leading teams or projects
•Active Top Secret clearance with SSBI; Ability to obtain a TS/SCI clearance
•Active CAP, GSLC, CISM, or CISSP certification
•CND experience (Protect, Detect, Respond and Sustain) within a Computer Incident Response organization
•In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g. Nitro/McAfee Enterprise Security Manager, ArcSight, QRadar, LogLogic, Splunk)
•Experience and proficiency with any of the following: Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics
•Experience with malware analysis concepts and methods
•Knowledge of incident response and handling methodologies
•Knowledge of defense-in-depth principles, network/HW/SW security architecture, network topology, IT device integrity, and common security elements
•Experience determining and taking  appropriate courses of actions in response to identified and analyzed anomalous network activity
•Experience reconstructing malicious attacks or activity based on network traffic and identified anomalies
•Experience in writing and publishing CND guidance and reports on incident findings to appropriate stakeholders
•Knowledge of Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA)
•Knowledge of CND policies, procedures, and regulations
•Other Active Cyber Certification(s), such as GIAC Penetration Tester (GPEN), GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), GIAC Certified Forensic Examiner (GCFE), GIAC Certified Forensic Analyst (GCFA), GIAC Reverse Engineering Malware (GREM), EnCase Certified Examiner (EnCE), GIAC Network Forensic Analyst (GNFA), GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Incident Handler (GCIH), etc.

Leidos Overview:
Leidos is a global science and technology solutions leader working to solve the world’s toughest challenges in the defense, intelligence, homeland security, civil, and health markets. The company’s 33,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported pro forma annual revenues of approximately $10 billion for the fiscal year ended January 1, 2016 after giving effect to the recently completed combination of Leidos with Lockheed Martin's Information Systems & Global Solutions business (IS&GS). For more information, visit www.Leidos.com. The company’s diverse employees support vital missions for government and commercial customers. Qualified women, minorities, individuals with disabilities and protected veterans are encouraged to apply. Leidos will consider qualified applicants with criminal histories for employment in accordance with relevant Laws. Leidos is an Equal Opportunity Employer.
Other Locations:  
Link for schema