Leidos is seeking a motivated SOC analyst to join our team on a highly visible cyber security single-award IDIQ vehicle. This is a Federal Government program responsible for the prevention identification containment and eradication of cyber threats to IT Enterprise through monitoring intrusion detection and protective security services. This includes local area networks/wide area networks (LAN/WAN) commercial Internet connection public facing websites wireless mobile/cellular cloud security devices servers and workstations. This Program is responsible for supporting the overall security of Enterprise-wide information systems and collects investigates and reports any suspected and confirmed security violations.
The SOC analyst will perform the following:
Coordinate investigation and response efforts throughout the Incident Response lifecycle
Coordinate investigation and response efforts throughout the Incident Response lifecycle
Correlate and analyze events and data to determine scope of Cyber Incidents
Acquire and analyze endpoint and network artifacts volatile memory malicious files/binaries and scripts
Recognize attacker tactics techniques and procedures as potential indicators of compromise (IOCs) that can be used to improve monitoring analysis and Incident Response.
Develop document and maintain Incident Response process procedures workflows and playbooks
Tune and maintain security tools (EDR IDS SIEM etc) to reduce false positives and improve SOC detection capabilities
Document Investigation and Incident Response actions taken in Case Management Systems and prepare formal Incident Reports
Create metrics and determine Key Performance Indicators to drive maturity of SOC operations
Develop security content such as scripts signatures and alerts
Basic Qualifications:
BS Degree and less than 2 years of experience. Additional experience and security certifications may be considered in lieu of a degree.
Knowledge of each phase of the Incident Response life cycle
Understanding of Operating Systems (Windows/Linux) operations and artifacts
Understanding of Enterprise Network Architectures to include routing/switching common protocols (DHCP DNS HTTP etc) and devices (Firewalls Proxies Load Balancers VPN etc)
Ability to recognize suspicious activity/events common attacker TTPs and perform logical analysis and research to determine root cause and scope of Incidents
Be familiar with Cyber Kill Chain and have utilized the ATT&CK Framework
Ability to independently prioritize and complete multiple tasks with little to no supervision
Flexible and adaptable self-starter with strong relationship-building skills
Strong problem-solving abilities with an analytic and qualitative eye for reasoning
Candidates must be able to obtain an CISA EOD
At Leidos we dont want someone who fits the moldwe want someone who melts it down and builds something better. This is a role for the restless the over-caffeinated the ones who ask whats next before the dust settles on whats now.
If youre already scheming step 20 while everyone else is still debating step 2 good. Youll fit right in.
For U.S. Positions: While subject to change based on business needs Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job education experience knowledge skills and abilities as well as internal equity alignment with market data applicable bargaining agreement (if any) or other law.
Required Experience:
IC
Leidos is an innovation company rapidly addressing the world's most vexing challenges in national security and health. Our 47,000 employees collaborate to create smarter technology solutions for customers in these critical markets.