Cyber Threat Analyst - Tier 2
Department of Homeland Security (DHS), Security Operations Center (SOC) Support Services is a US Government program responsible to monitor, detect, analyze, mitigate, and respond to cyber threats and adversarial activity on the DHS Enterprise. The DHS SOC has primary responsibility for monitoring and responding to security events and incidents detected at the Trusted Internet Connection (TIC) and Policy Enforcement Point (PEP) and is responsible for directing and coordinating detection and response activities performed by each Component SOC. Direction and coordination are achieved through a new shared DHS incident tracking system and other means of coordination and communication.
Tier 2 Cyber Threat Analyst should have expertise in one of the following specialized areas: - Email security - Digital media forensic - Monitoring and detection - Incident Response - Vulnerability assessment and pen test - Cyber intelligence analysis Supports detection, containment, and eradication of APT activities targeting customer networks. Process community reporting, conduct link analysis, and collaborate with other Government cyber fusion teams. Publish intelligence products to inform network defenders about APT activities, new detection methods, among other topics of interest. This position location is in the Washington Metropolitan Area.
Minimum of current Top Secret clearance with ability to obtain TS/SCI Clearance. In addition to specific security clearance requirements all Department of Homeland Security SOC employees are required to obtain an Entry on Duty (EOD) clearance to support this program.
Bachelors degree in Computer Science, Engineering, Information Technology, Cyber Security, or related field. Minimum of 7 years of professional experience in incident detection and response, malware analysis, or cyber forensics
In addition, minimum of five (5) years of specialized experience in one or more of the following areas:
- Email security
- Digital media forensic
- Monitoring and detection
- Incident Response
- Vulnerability assessment and pen test
- Cyber intelligence analysis
Must have at least one of the following certifications: SANS GIAC: GCED, GCIA, GCFA, GPEN, GWAPT, GCFE, GREM, GXPN, GMON or GCIH ISC2 CCFP, CCSP, CISSP CERT CSIH EC Council: CHFI, LPT, ECSA, Offensive Security: OSCP, OSCE, OSWP and OSEE EnCase: EnCE Dod 8570: IAT L3, CNDSP Analyst or IR Carnegie Mellon: CCSIH"
Extensive experience analyzing and synthesizing information with other relevant data sources, providing guidance and mentorship to others in cyber threat analysis and operations, evaluating, interpreting, and integrating all sources of information, and fusing computer network attack analyses with counterintelligence and law enforcement investigations.
Desired Skills: Experience in cyber government, and/or federal law enforcement. Experience with Cyber Kill Chain. Experience in cyber government, and/or federal law enforcement. Experience with Cyber Kill Chain.
Leidos is a global science and technology solutions leader working to solve the world’s toughest challenges in the defense, intelligence, homeland security, civil, and health markets. The company’s 33,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported pro forma annual revenues of approximately $10 billion for the fiscal year ended January 1, 2016 after giving effect to the recently completed combination of Leidos with Lockheed Martin's Information Systems & Global Solutions business (IS&GS). For more information, visit www.Leidos.com. The company’s diverse employees support vital missions for government and commercial customers. Qualified women, minorities, individuals with disabilities and protected veterans are encouraged to apply. Leidos will consider qualified applicants with criminal histories for employment in accordance with relevant Laws. Leidos is an Equal Opportunity Employer.