#R-00148139
rategic Cybersecurity Task Order. The Detection Engineer will need to be a self-starter with excellent analytical and problem-solving skills, flexibility, good judgment, and the ability to work within a team to stand up and mature the cybersecurity capabilities of our customer.
Threat Detection Engineering plays a crucial role in defending an organization by building, implementing, and tuning threat detection logic to identify and respond to malicious activities. The position requires expertise in security analytics, data correlation, threat intelligence, and automation within a Security Information and Event Management (SIEM) platform or equivalent detection system/s.
Primary Responsibilities:
The Threat Detection Engineer will be responsible for the following:
Develop, implement, and maintain detection rules to identify malicious behaviors.
Optimize detection efficacy by reducing false positives and increasing true positive rates
Work closely with the Incident Response Team (IRT) to provide coverage for detected threats, as well as detailed analysis and documentation.
Integrate automated workflows and playbooks to streamline response processes.
Collaborate with threat intelligence teams to develop detection logic for emerging threats.
Generate reports and dashboards to highlight detection efficiency and threat trends.
Document detection processes, methodologies, and workflows.
Share insights and mentor team members on best practices in threat detection.
Basic Qualifications:
BS degree in Science, Technology, Engineering, Math or related field and 12-15 years of prior relevant experience with a focus on cybersecurity. Additional years of experience and/or certs will be considered in lieu of a degree.
Strong expertise in SIEM platforms and familiarity with query languages (e.g. SPL, KQL).
Understanding of malware behaviors, threat actors, and attack tactics (MITRE ATT&CK).
Ability to independently assess and improve detection rules.
Expertise with troubleshooting and documentation skills.
Develop and fine-tune detection rules to identify more complex threats.
Collaborate with the threat intelligence team to incorporate threat indicators into detection logic. Experience with automated detection workflows and streamline incident response processes.
The Engineer will contribute to playbook development and work closely with Incident Response on detection coverage.
Lead/Mentor Analysts in detection techniques and security best practices.
Preferred Qualifications:
Understanding of malware behaviors, threat actors, and attack tactics (MITRE ATT&CK).
Experience with automation and scripting (e.g., Python, PowerShell).
Candidate must have one of the following:
Certifications
SANS: GCDA, GCDT, GCFA, GCFE, GCTI, GCIA, GCIH
Splunk: Certified Power User, Splunk Admin, Certified Cybersecurity Defense Analyst Certified Cybersecurity Defense Engineer (SCCDE).
MITRE: MITRE ATT&CK Defender (MAD) certs.
Original Posting Date:
2024-11-13
While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Pay Range:
Pay Range $122,200.00 - $220,900.00
The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
#Remote