Attack Sensing & Warning Analyst (T2 AS&W Analyst)

Leidos

Not Interested
Bookmark
Report This Job

profile Job Location:

Ashburn, IL - USA

profile Monthly Salary: $ 87100 - 157450
Posted on: 18 hours ago
Vacancies: 1 Vacancy

Job Summary

The U.S. Department of Homeland Security (DHS) Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible to prevent identify contain and eradicate cyber threats to CBP networks through monitoring intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN) commercial Internet connection public facing websites wireless mobile/cellular cloud security devices servers and workstations. The CBP SOCis responsible fortheoverall security of CBP Enterprise-wide information systems and collects investigates and reports any suspected and confirmed security violations.

Leidos is seeking an experienced Tier 2 Attack Sensing & Warning Analyst to join our team. As a member of the AS&W team supporting U.S. Customs and Border Protection (CBP) you will be responsible forleveraging advanced security technologies including EDR SIEM and network security tools to monitor triage and investigate endpoint and network activity escalating alerts in accordance with established playbooks and procedures analyzinglogs and attacker behaviors to identify APT tactics aggregatingIOCs and developingsecurity content scripts and tools that enhance detection and incident response capabilitiesin support of the protection of the customers systems networks and assets.

Primary Responsibilities:

Shift schedule: 7am-7pmSun-Tues every other Wednesday.

  • Utilizestate of the arttechnologies such as Endpoint Detection & Response(EDR)tools log analysis (Splunk) andoccasionallynetwork forensics (full packet capture solution) toinvestigative activity to examine endpoint and network-based data.

  • Monitor alerting channels for multiple endpoint and network tools for alerts of various criticalities and escalate according to defined processes procedures and playbooks.

  • Triage alerts todeterminenature of activity occurring on customer networks systems servers and mobile devices.

  • Conduct log analysisfrom multiple avenues and tools totriageactivityin support of incident response.

  • Recognize attacker and APT activity tactics and procedures and aggregateindicators of compromise (IOCs) that can be used to improve monitoringanalysisand incident response.

  • Develop and build security content scripts tools or methods to enhance the incident investigation processes.

  • LeadIncident Response activities and mentor junior SOC staff.

  • Create daily weekly and monthly reports for dissemination to customer leadership with emphasis on attention to detail andaccuratecapturing of relevanttimelydata for briefings.

  • Succinctly and accurately capture technical details and summarize findings for less technical audiences.

  • Work with key stakeholders to implement remediation plans in response to incidents.

  • Effectively investigative andidentifyroot cause findings then communicate findings to stakeholders including technical staff and leadership.

  • Strong problem-solving abilities with an analytic and qualitative mindset.

  • Effectively communicate with customer leadership anddisseminatetimelyupdates of critical incidents with emphasis on attention to detail andaccuratereporting.

Basic Qualifications:

  • Bachelors degree in computer scienceengineering Information Technology(IT) Cyber Security or related field and 4 years of professional experience. Additional years of experience are accepted in lieu of degree.

  • 5years of professional experience(or a Bachelors Degree and 3 years of professional experience)in incident detectionresponseand remediation.

  • Minimum of three (3) but (5) preferred years of specialized experience in one or more of the following areas:

  • Email security

  • Digital media forensic

  • Monitoring and detection

  • Incident Response

  • Vulnerability assessment andpenetration testing

  • Cyber intelligence analysis

  • Extensive experience analyzing and synthesizing information with other relevant data sources providing guidance and mentorship to others in cyber threat analysis and operations.

  • Ability to collaborate with technical staff and customers toidentify assess and resolve complex security problems/issues/risks andfacilitateresolution and risk mitigation.

  • Ability to stayup to date with the latest threat intelligencesecurity trends tools and capabilities.

  • Possess strong problem-solving abilities with an analytic and qualitative eye for reasoning.

  • Ability to independently prioritize and complete multiple tasks with little to no supervision.

Preferred Qualifications:

  • Ability to coordinate and communicate well with team leads and government personnel.

  • Experience with detection engineering efforts to tune alerts signatures and tools to reduce false positives.

  • Experience in cyber government and/or federal law enforcement

  • Experience withtheCyber Kill Chainand MITRE ATT&CK framework

  • Ability to formulate and create new processes metrics and procedures to improve security operations.

Required certifications:

The candidate should have at minimum ONE of the following certifications:

  • CompTIA Cyber Security Analyst (CySA)

  • CEH Certified EthicalHacker

  • CompTIA Linux Network Professional (CLNP)

  • CompTIA Pentest

  • CompTIA Cybersecurity Analyst (CySA)

  • GPEN PenetrationTester

  • GWAPT Web Application Penetration Tester

  • GSNA System andNetwork Auditor

  • GISF SecurityFundamentals

  • GXPN Exploit Researcher and Advanced PenetrationTester

  • GWEB Web ApplicationDefender

  • GNFA Network ForensicAnalyst

  • GMON Continuous Monitoring Certification

  • GCTI Cyber Threat Intelligence

  • GOSI Open SourceIntelligence

  • OSCP (CertifiedProfessional)

  • OSCE (Certified Expert)

  • OSWP (WirelessProfessional)

  • OSEE (Exploitation Expert)

  • CCFP Certified Cyber Forensics Professional

  • CISSP Certified Information SystemsSecurity

  • CHFI Computer Hacking Forensic Investigator

  • LPT Licensed PenetrationTester

  • CSA EC Council Certified SOC Analyst (Previously ECSA EC-Council Certified Security Analyst)

  • ENSA EC-Council Network Security Administrator

  • ECIH EC-Council Certified Incident Handler

  • ECSS EC-Council Certified Security Specialist

  • ECES EC-Council Certified Encryption Specialist

Clearance:

All Department of Homeland Security CBP SOC employeesare required tofavorably pass a 5-year (BI) Background Investigation

At Leidos we dont want someone who fits the moldwe want someone who melts it down and builds something better. This is a role for the restless the over-caffeinated the ones who ask whats next before the dust settles on whats now.

If youre already scheming step 20 while everyone else is still debating step 2 good. Youll fit right in.

Original Posting:

January 14 2026

For U.S. Positions: While subject to change based on business needs Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.

Pay Range:

Pay Range $87100.00 - $157450.00

The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job education experience knowledge skills and abilities as well as internal equity alignment with market data applicable bargaining agreement (if any) or other law.


Required Experience:

IC

The U.S. Department of Homeland Security (DHS) Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible to prevent identify contain and eradicate cyber threats to CBP networks through monitoring intrusion detection and protective security services...
View more view more

Key Skills

  • ArcGIS
  • Intelligence Community Experience
  • GIS
  • Python
  • Computer Networking
  • Data Collection
  • Intelligence Experience
  • R
  • Relational Databases
  • Analysis Skills
  • Data Management
  • Application Development

About Company

Company Logo

Leidos is an innovation company rapidly addressing the world's most vexing challenges in national security and health. Our 47,000 employees collaborate to create smarter technology solutions for customers in these critical markets.

View Profile View Profile