• Find preferred job with Jobstinger
  • ID
    #17810905
  • Job type
    Permanent
  • Salary
    TBD
  • Source
    Leidos
  • Date
    2021-07-30
  • Deadline
    2021-09-28

Vacancy expired!

Description

Job Description: Leidos is seeking a Cyber Security Incident Response Engineer!

IR daily activities/Candidate Daily Responsibilities:
  • Respond to cyber incidents, including responding to IR phone calls and emails, and preparing situational awareness reports for DOC, its bureaus, and/or DOC management
  • Act as main investigators for potential incidents identified by SOC analysts
  • Investigate phishing and self-identified potential cyber threats (phishing emails sent to the CIRT)
  • Work with DOC users to analyze, triage, contain, and remediate security incidents
  • Track incident managements thoroughly and communicate with end users and senior CIO officials effectively
  • Participate regularly in SOC working group sessions, to include idea generation for new content rules for security alerting and reduction of false positives. Collaborate across organizational lines and develop depth in your desired cyber discipline and/or technologies
  • Follow documented procedures yet have an eye towards process improvement/effectivity
  • Knowledgeable on multiple technology and system types
  • Able to articulate the incident response lifecycle
  • Manages and responds to computer security incidents that involve enterprise systems and data including personally identifiable information (PII) breaches
  • Detect, collect and report cybersecurity incidents
  • Experience detecting and remediate malicious codes
  • Helps improve the overall security posture by independently verifying the security of enterprise systems, and to ensure the timely dissemination of security information to the appropriate stakeholders
  • Analyze firewall logs, Full Packet Capture (PCAP), IDS alerts, Anti-malware alerts, Host Intrusion Prevent System (HIPS), and server and application logs to investigate events and incidents for anomalous activity and produce reports of findings
  • Conduct reviews and analysis of proxy logs, Microsoft Windows and Active Directory logs, Orchestrator logs, and malicious code to identify, contain, eradicate, and ensure recovery from incidents

Features of the candidate/job:
  • Inquisitive, problem-solving oriented
  • Able to work 24x7 shifts
  • Mid IR (Tier II): 3-7 years of SOC/IR experience
  • Sr IR (Tier III): 7+ years of SOC/IR experience
  • Solid understanding of cyber landscape + typical threat vectors

Candidate Preferred Qualifications:
  • Experience with multiple types of attack types and attack vectors
  • Ability to perform deep dive investigations from start to finish of a security incident using data from both host based and network based devices.
  • Ability to forensically investigate both Windows and Linux devices for compromise.
  • Ability to analyze malicious files through code analysis/reverse engineering.
  • Ability to perform introspection of incident for after action reports to both technical and non-technical staff
  • Up to date understanding of threat vectors, attacker methodology and how they tie into the cyber kill chain or ATT&CK framework.
  • Typically require BS degree and 4 - 8 years of prior relevant experience. Will conciser more relevant experience in lieu of a degree

Specialized Skill Areas:
  • Digital Forensics
  • Automation/Scripting
  • SIEM Exposure
  • Incident response triage
  • Malware reverse engineering
  • Threat hunting

Must have at least one of the following certification:
  • CERT Certified Computer Security Incident Handler
  • ECC CEH (Electronic Commerce Council Certified Ethical Hacker)
  • GCIH (GIAC Certified Incident Handler)
  • GISF (GIAC Information Security Fundamentals)
  • CISSP (ISC2 Certified Information System Security Professional)
  • SCNP (Security Certified Network Professional)
  • SCNA (Security Certified Network Architect)

Clearance Requirement:
  • Must be US Citizen
  • Minimum fully adjudicated Secret and Interim Top Secret clearance

Driven by our talented workforce, the Federal Energy, Environment and Commerce Operation builds trust through an array of energy-related IT, environmental science and engineering solutions to meet our customers' needs.

Key Capabilities:
  • Large Infrastructure
  • Mission Support
  • Digital Modernization
  • Command & Control
  • Mission Applications
  • Environmental Science
  • Nuclear Security
  • Engineering Services

Leidos is growing! Connect with us on LinkedIn and Facebook.

We value and support the well-being and mobility of our employees with competitive benefit packages, complementary e-learning training, work-life flexibility, an exciting External Referral Program, and a diverse, inclusive and ethical work place. In fact, in 2020, Leidos was ranked as one of the "World's Most Ethical Companies" by the Ethisphere Institute for the third consecutive year.

External Referral Bonus: Eligible

External Referral Bonus $: 2000

Potential for Telework: No

Clearance Level Required: Top Secret

Travel: No

Scheduled Weekly Hours: 40

Shift: Rotating

Requisition Category: Professional

Job Family: Cyber Operations

Pay Range: Pay Range $71,500.00 - $110,000.00 - $148,500.00

Vacancy expired!

Report job