• Find preferred job with Jobstinger
  • ID
    #17179813
  • Job type
    Permanent
  • Salary
    TBD
  • Source
    Leidos
  • Date
    2021-07-22
  • Deadline
    2021-09-20
 
Permanent

Vacancy expired!

Description

Job Description:

Department of Homeland Security (DHS), Security Operations Center (SOC) Support Services is a US Government program responsible to monitor, detect, analyze, mitigate, and respond to cyber threats and adversarial activity on the DHS Enterprise. The DHS SOC has primary responsibility for monitoring and responding to security events and incidents detected at the Trusted Internet Connection (TIC) and Policy Enforcement Point (PEP) and is responsible for directing and coordinating detection and response activities performed by each Component SOC. Direction and coordination are achieved through a new shared DHS incident tracking system and other means of coordination and communication. Leidos is seeking a Tier 2 Incident Response Analyst to join our team on this highly visible DHS CBP SOC Program.

The Incident Responder will perform the following:
  • Coordinate investigation and response efforts throughout the Incident Response lifecycle
  • Correlate and and analyze events and data to determine scope of Cyber Incidents
  • Acquire and analyze endpoint and network artifacts, volatile memory, malicious files/binaries and scripts
  • Recognize attacker tactics, techniques, and procedures as potential indicators of compromise (IOCs) that can be used to improve monitoring, analysis and Incident Response.
  • Develop, document, and maintain Incident Response process, procedures, workflows, and playbooks
  • Tune and maintain security tools (EDR, IDS, SIEM, etc) to reduce false positives and improve SOC detection capabilities
  • Document Investigation and Incident Response actions taken in Case Management Systems and prepare formal Incident Reports
  • Create metrics and determine Key Performance Indicators to drive maturity of SOC operations
  • Develop security content such as scripts, signatures, and alerts

The ideal candidate will possess:
  • In-depth knowledge of each phase of the Incident Response life cycle
  • Expertise of Operating Systems (Windows/Linux) operations and artifacts
  • Understanding of Enterprise Network Architectures to include routing/switching, common protocols (DHCP, DNS, HTTP, etc), and devices (Firewalls, Proxies, Load Balancers, VPN, etc)
  • Ability to recognize suspicious activity/events, common attacker TTPs, and perform logical analysis and research to determine root cause and scope of Incidents
  • Be familiar with Cyber Kill Chain and have utilized the ATT&CK Framework
  • Have scripting experience with Python, PowerShell, and/or Bash
  • Ability to independently prioritize and complete multiple tasks with little to no supervision
  • Flexible and adaptable self-starter with strong relationship-building skills
  • Strong problem solving abilities with an analytic and qualitative eye for reasoning

Basic Qualifications:

candidates must be able to obtain a CBP BI

• Bachelors Degree in IT related field or higher and 8 years' experience in an information technology field with a minimum of 2 years of experience in the areas of incident detection and response, malware analysis, or computer forensics.

Must have at least one of the following certifications:

SANS GIAC: GCIH, GCIA, GCFA, GPEN GCFE, GREM

CISSP OSCP, OSCE, OSWP

External Referral Bonus:Eligible

External Referral Bonus $:5000

Potential for Telework:No

Clearance Level Required:None

Travel:No

Scheduled Weekly Hours:40

Shift:24/7 12 Hour Shift Pattern

Requisition Category:Professional

Job Family:Cyber Operations

Pay Range:

Vacancy expired!

Report job