acking system and other means of coordination and communication.
The Monitoring and Analysis team provide 24x7 support across 4 different shifts. We have Front half shifts (day and night) and back half shifts (day and night). The front half shift will work 12-hour shifts from Sunday – Tuesday and alternating Wednesdays. The back half shift will work 12-hour shifts from Thursday – Saturday and alternating Wednesdays. Candidates must have the ability to work non-core hours, if necessary.
Duties include network security monitoring and detection. Proactively searching for threats. Inspect traffic for anomalies and new malware patterns. Investigate and analyze logs. Provide analysis and response to alerts, and document activity in SOC investigations and Security Event Notifications (SENs).
List daily duties and/or specific job responsibilities.
Utilize a SIEM for enterprise monitoring and detection
Create Security Event Notifications to document investigation findings
Perform critical thinking and analysis to investigate cyber security alerts
Analyze network traffic using enterprise tools (https://e.g. Full PCAP, Firewall, Proxy logs, IDS logs, etc)
Collaborate with team members to analyze an alert or a threat
Stay up to date with latest threats
Monitor shared email box for notifications and requests
Utilize OSINT to aid in their investigation
Contribute to content tuning requests
Have familiarity with dynamic malware analysis and experience analyzing malicious websites
Have experience performing analysis of network traffic, host logs, and correlating diverse security logs to perform recommendations for response
Utilize the Cyber Kill Chain in their analysis
Review and provide feedback to junior analysts’ investigation
Review and implement network/host counter measures
Contribute to SOP/brown bag development and updating
Attend briefings and take appropriate actions to defend the enterprise
Help cross train junior analyst
Contribute to content tuning and development in coordination with tier 3 analysts
Understanding of security tools such as IDS, IPS, Proxy, Firewall, Antivirus, DLP
Working knowledge of Windows OS and standard system logs
List the “must have” MINIMUM requirements to be considered for the position and ensure minimum quals fall within the minimum Leidos job code requirements. Example: Bachelors’ Degree with 6 years’ of applicable experience or 4 additional years’ of experience in lieu of degree. Must be able to obtain and maintain a TS/SCI Clearance. Must have 2+ years JAVA experience.
Basic requirements that the recruiter should use as a filter:
All Cyber Network Defense Analyst candidates shall have a bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field AND a minimum of four (4) years professional experience in one or more of the areas listed below:
Incident Detection and Response
The ideal candidate is a self-motivated individual in pursuit of a career in cyber security.
Candidates must have extensive experience working with various security methodologies and processes, advanced knowledge of TCP/IP protocols, experience configuring and implementing various of technical security solutions, extensive experience providing analysis and trending of security log data from a large number of heterogeneous security devices, and must possess commensurate knowledge in two or more of the following areas related to cybersecurity:
• Vulnerability Assessment
• Intrusion Prevention and Detection
• Access Control and Authorization
• Policy Enforcement
• Application Security
• Protocol Analysis
• Firewall Management
• Incident Response
• Advanced Threat Protection
• Knowledgeable about security methodologies and SOC processes
• Experienced working in a SOC and supporting SOC operations
• Knowledgeable about network ports and protocols (https://e.g. TCP/UDP, HTTP, ICMP, DNS, SMTP, etc)
• Experienced with network topologies and network security device functions (https://e.g. Firewall, IDS/IPS, Proxy, DNS, etc).
• Experience analyzing PCAPs and network logs.
• Knowledge of common end user and web application attacks and countermeasures against the attack
• Experience training and mentoring junior analysts
• Knowledgeable of common end user and web application attacks
• Experience creating SOP and providing guidance to junior analyst
• Understanding of APTs and TTPs
• Able to extrapolate data to pivot and take actions as necessary
• Perform critical thinking and analysis to investigate cyber security alerts
Must have at least one of the following certifications:
CompTIA: CASP, Cloud+, Network+, Security+, Linux+, CySA+, CLNP, Pentest+, A+, Server+
SANS GIAC: GSEC, GCIA, GCIH, GCFA, GPEN, GWAPT, GCFE, GSNA, GREM, GPPA, GCWN, GXPN, GCED, GMON, GISP, GAWN, GSSP, GICSP, GWEB, or GNFA
Carnegie Mellon University: SEI
Cisco: CCNA, CCNP, CCNA
EC Council: CEH, CHFI, LPT, ECSA, CCISO, ENSA, ECIH, CNDA, ECSS, ECSP, ECES
ISC2: CCFP, CCSP, CISSP, CSSLP, or SSCP
Microsoft: MCSE, Microsoft 365 Fundamentals, Microsoft Certified Azure Fundamentals, MS 365 Certified Security Administrator, Microsoft Certified Azure Security Engineer
Defense Cyber Investigative Training Academy: Cyber Analyst Course
Splunk: Core Certified User, Certified Cybersecurity Defense Analyst
Swimlane: SCSA, Certified SOAR User, Certified SOAR Developer
Tanium: Tanium Essentials
Offensive Security: OSCP, OSCE, OSWP or OSEE
Must have current TS/SCI. In addition to specific security clearance requirements, all Department of Homeland Security SOC employees are required to obtain an Entry on Duty (EOD) clearance to support this program.
List additional skills and experience that is “nice to have” but not required.
Familiarity with cloud (https://e.g. o365, Azure, AWS, etc) security monitoring
Hands-on experience utilizing network security tools (https://e.g. IDS/IPS, Full PCAP, WAF, etc) and SIEM
Experience creating SIEM and/or IDS content
Experience with creating custom SPL
Understanding of various Threat Intel Frameworks (https://e.g. CKC, MITRE ATT&CK, Diamond model, etc)
Pay Range $78,https://000.00 - $141,https://000.00
The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.