Home




Cyber Threat Analyst Tier 3

APPLY NOW    
Job Number:
652232
Job Category:
Cyber Security
Location:
ALEXANDRIA, VA US
Schedule:
Full-time
Travel:
None
Shift:
Day Job
Potential for Teleworking:
No
Clearance Level Must Currently Possess:
Secret
Clearance Level Must Be Able to Obtain:
Top Secret/SCI
Description:

Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations.  The CBP SOC is responsible for the overall security of CBP Enterprise-wide information systems, and collects, investigates and reports any suspected and confirmed security violations.


Leidos is seeking a Tier 3 Cyber Threat Analyst to join our team on this highly visible DHS CBP SOC program with work location in Alexandria.  

 

Duties will include investigating computer and information security incidents to determine extent of compromise to information and automated information systems, providing computer forensic and intrusion support to high technology investigations in the form of computer evidence seizure, computer forensic analysis, data recovery, and network assessments, researching and maintaining proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption.


In addition, the Tier 3 Analyst will lead and mentor other SOC Support Staff and will communicate with executive leadership regarding matters of significant importance to the DHS SOC Support Services Program.

 

The Analyst should have expertise in at least one of the following specialized areas: - Email security - Digital media forensic - Monitoring and detection - Incident Response - Vulnerability assessment and pen test - Cyber intelligence analysis Supports detection, containment, and eradication of APT activities targeting customer networks. Process community reporting, conduct link analysis, and collaborate with other Government cyber fusion teams. Publish intelligence products to inform network defenders about APT activities, new detection methods, among other topics of interest.


Will work a rotating shift consisting of three 12 hour shifts with four days off the first week of the pay period and three 12 hour shifts, one 8 hour shift and 3 days off the second week of the pay period.   


LeadGen

LeadGenCyber

DHSCYBER

CBPCYBER

External Employee Referral Eligible


Qualifications:
EDUCATION & EXPERIENCE: 
Requires Bachelors Degree in Computer Science, Engineering, Information Technology, Cyber Security, or related field and 12 to 15 years of prior relevant experience or Masters with 10 to 13 years of prior relevant experience. May possess a Doctorate in technical domain.   Prior relevant experience should be in the areas of incident detection and response, malware analysis, or cyber forensics.

Minimum of current Secret clearance with ability to obtain TS/SCI Clearance. In addition to specific security clearance requirements all DHS CBP SOC personnel must have or be able to favorable pass a 5 year (BI) backgorund Investigation.  


In addition, minimum of 7 years of specialized experience in one or more of the following areas:

Email security

Digital media forensic

Monitoring and detection

Incident Response

Vulnerability assessment and Pen Test

Cyber intelligence analysis 


Must have at least one of the following certifications: 

SANS GIAC: GCED, GCIA, GCFA, GPEN, GWAPT, GCFE, GREM, GXPN, GMON or GCIH ISC2 CCFP, CCSP, CISSP CERT CSIH EC Council: CHFI, LPT, ECSA, Offensive Security: OSCP, OSCE, OSWP and OSEE EnCase: EnCE Dod 8570: IAT L3, CNDSP Analyst or IR Carnegie Mellon: CCSIH"


Extensive experience analyzing and synthesizing information with other relevant data sources, providing guidance and mentorship to others in cyber threat analysis and operations, evaluating, interpreting, and integrating all sources of information, and fusing computer network attack analyses with counterintelligence and law enforcement investigations.

 

DESIRED SKILLS: 

Experience in cyber government, and/or federal law enforcement. Cyber Kill Chain knowledge.  


Leidos Overview:
Leidos is a global science and technology solutions leader working to solve the world’s toughest challenges in the defense, intelligence, homeland security, civil, and health markets. The company’s 33,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported pro forma annual revenues of approximately $10 billion for the fiscal year ended January 1, 2016 after giving effect to the recently completed combination of Leidos with Lockheed Martin's Information Systems & Global Solutions business (IS&GS). For more information, visit www.Leidos.com. The company’s diverse employees support vital missions for government and commercial customers. Qualified women, minorities, individuals with disabilities and protected veterans are encouraged to apply. Leidos will consider qualified applicants with criminal histories for employment in accordance with relevant Laws. Leidos is an Equal Opportunity Employer.
Other Locations:  
APPLY NOW    
Link for schema