drjobs Tier 1 ASW Analyst

Tier 1 ASW Analyst

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Ashburn, IL - USA

Monthly Salary drjobs

$ 55250 - 99875

Vacancy

1 Vacancy

Job Description

Leidos Digital Modernization Sector is seeking a Tier 1 AS&W Analyst for this highly visible cyber security program supporting Customs and Border Protection (CBP) security operations center (SOC). CBP SOC is a US Government program responsible to prevent identify contain and eradicate cyber threats to CBP networks through monitoring intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN) commercial Internet connection public facing websites wireless mobile/cellular various cloud environments security devices servers and workstations.The CBP SOC is responsible for the overall security of CBP Enterprisewide information systems and collects investigates and reports any suspected and confirmed security violations.

The shift schedule is 7am7pm SundayTuesday every other Wednesday.This position is located at our customer site located in Ashburn VA.

U.S. Citizenship and ability to favorably pass a 5year (BI) Background Investigationis required to begin work on the program.

What will you do in this role

  • Conduct log analysis and triage in support of incident response.

  • Recognize attacker and APT activity tactics and procedures as indicators of compromise (IOCs) that can be used to improve monitoring analysis and incident response.

  • Develop and build security content scripts tools or methods to enhance the incident investigation processes.

  • Work with key stakeholders to implement remediation plans in response to incidents.

  • Effectively investigative and identify root cause findings then communicate findings to stakeholders including technical staff and leadership.

  • Flexible and adaptable selfstarter with strong relationshipbuilding skills

  • Strong problemsolving abilities with an analytic and qualitative eye for reasoning

  • Ability to independently prioritize and complete multiple tasks with little to no supervision

  • Emphasis on ability to succinctly and accurately capture technical details and summarize findings for less technical audiences.

These are required qualifications for this role

  • Bachelors degree in Science or Engineering Field IT or Cybersecurity or related field. Additional experience and certifications may be considered in lieu of a degree.

  • 0 2 years of experience be in the areas of incident detection and response remediation malware analysis or computer forensics.

  • Minimum of one 1 but two 2 preferred years of specialized experience in one or more of the following areas:

  • Email security

  • Digital media forensic

  • Monitoring and detection

  • Incident Response

  • Vulnerability assessment and pen test

  • Cyber intelligence analysis

  • Extensive experience analyzing and synthesizing information with other relevant data sources providing guidance and mentorship to others in cyber threat analysis and operations.

  • Evaluating interpreting and integrating all sources of information and fusing computer network attack analyses with counterintelligence and law enforcement investigations.

  • Experience with aggregating and creating daily weekly and monthly reports with emphasis on communication skills to accurately convey technical concepts to various audiences.

Must have at least one of the following certifications:

  • CompTIA Advanced Security Practitioner(CASP)

  • CompTIA Cloud

  • CompTIA Network

  • CompTIA Security

  • CompTIA Linux

  • CompTIA Cyber Security Analyst (CySA)

  • CompTIA Linux Network Professional (CLNP)

  • CompTIA Pentest

  • CompTIA A

  • CompTIA Cybersecurity Analyst (CySA)

  • CompTIA Server

  • GSEC Security Essentials

  • GCIH Incident Handler

  • GCIA Intrusion Analyst

  • GCFA Forensic Analyst

  • GPEN Penetration

  • GWAPT Web Application Penetration Tester

  • GCFE Forensic Examiner

  • CEH Certified Ethical Hacker

  • CHFI Computer Hacking Forensic Investigator

  • CSA EC Council Certified SOC Analyst (Previously ECSA ECCouncil Certified Security Analyst)

  • ECIH ECCouncil Certified Incident Handler

  • CNDA Certified Network Defense Architect

These are preferred qualifications for this role

  • Ability to coordinate and communicate well with team leads and government personnel

  • Provide weekly status reports and requested documentation

  • Experience in cyber government and/or federal law enforcement

  • Experience with the Cyber Chain and MITRE ATT&CK framework

Original Posting:

March 19 2025

For U.S. Positions: While subject to change based on business needs Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.

Pay Range:

Pay Range $55250.00 $99875.00

The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job education experience knowledge skills and abilities as well as internal equity alignment with market data applicable bargaining agreement (if any) or other law.


Required Experience:

IC

Employment Type

Full-Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.