Senior Incident Response Analyst

Leidos

Not Interested
Bookmark
Report This Job

profile Job Location:

Arlington, TX - USA

profile Monthly Salary: $ 131300 - 237350
Posted on: 9 days ago
Vacancies: 1 Vacancy

Job Summary

At Leidos we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customers success. We empower our teams contribute to our communities and operate sustainable. Everything we do is built on a commitment to do the right thing for our customers our people and our community. Our Mission Vision and Values guide the way we do business.

If this sounds like the kind of environment where you can thrive keep reading!

The Digital Modernization Sector brings together our digital transformation and IT programs allowing us to better serve our customers through scale and repeatability. Leidos has a critical need for a Senior Incident Response Analyst to support the DHS CISA Program.

The Department of Homeland Security (DHS) Security Operations Center (SOC) Support Services is a US Government program responsible to monitor detect analyze mitigate and respond to cyber threats and adversarial activity on the DHS Enterprise. The DHS SOC has primary responsibility for monitoring and responding to security events and incidents detected at the Trusted Internet Connection (TIC) and Policy Enforcement Point (PEP) and is responsible for directing and coordinating detection and response activities performed by each Component SOC. Direction and coordination are achieved through a new shared DHS incident tracking system and other means of coordination and communication. Leidos is seeking a Senior Incident Response Analyst to join our team on this highly visible DHS CISA SOC Program.

The Incident Responder will perform the following:

Coordinate investigation and response efforts throughout the Incident Response lifecycle

Correlate and and analyze events and data to determine scope of Cyber Incidents

Acquire and analyze endpoint and network artifacts volatile memory malicious files/binaries and scripts

Recognize attacker tactics techniques and procedures as potential indicators of compromise (IOCs) that can be used to improve monitoring analysis and Incident Response.

Develop document and maintain Incident Response process procedures workflows and playbooks

Tune and maintain security tools (EDR IDS SIEM etc) to reduce false positives and improve SOC detection capabilities

Document Investigation and Incident Response actions taken in Case Management Systems and prepare formal Incident Reports

Create metrics and determine Key Performance Indicators to drive maturity of SOC operations

Develop security content such as scripts signatures and alerts

Basic Qualifications

Bachelors degree in Computer Science Engineering Information Technology Cyber Security or related field and 12-15 years of related experience. Additional years of experience and/or cyber certifications may be considered in lieu of degree.

In-depth knowledge of each phase of the Incident Response life cycle

Expertise of Operating Systems (Windows/Linux) operations and artifacts

Expertise of Enterprise Network Architectures to include routing/switching common protocols (DHCP DNS HTTP etc) and devices (Firewalls Proxies Load Balancers VPN etc)

Ability to recognize suspicious activity/events common attacker TTPs and perform logical analysis and research to determine root cause and scope of Incidents

Expertise with Cyber Kill Chain and have utilized the ATT&CK Framework

Have scripting experience with Python PowerShell and/or Bash

Ability to independently prioritize and complete multiple tasks with little to no supervision

Flexible and adaptable self-starter with strong relationship-building skills

Strong problem-solving abilities with an analytic and qualitative eye for reasoning

Strong verbal and written communication skills

Ability to communicate with all levels of audiences (subordinates peers & leadership)

* Candidate must have technical hands on experience in the areas of incident detection and response malware analysis or computer forensics.

All Department of Homeland Security SOC employees are required to favorably pass a 5-year (BI) Background Investigation.

Candidates will have at least one of the following certifications:

SANS GIAC: GCIH GCIA GCFA GPEN GCFE GREM

CISSP OSCP OSCE OSWP

Preferred Qualifications

Experience in cyber government and/or federal law enforcement FISMA systems.

If youre looking for comfort keep scrolling. At Leidos we outthink outbuild and outpace the status quo because the mission demands it. Were not hiring followers. Were recruiting the ones who disrupt provoke and refuse to fail. Step 10 is ancient history. Were already at step 30 and moving faster than anyone else dares.

Original Posting:

March 10 2026

For U.S. Positions: While subject to change based on business needs Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.

Pay Range:

Pay Range $131300.00 - $237350.00

The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job education experience knowledge skills and abilities as well as internal equity alignment with market data applicable bargaining agreement (if any) or other law.


Required Experience:

Senior IC

At Leidos we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customers success. We empower our teams contribute to our communities and operate sustainable. Everything we do is built on a commitment to do the right thing for our customers o...
View more view more

About Company

Company Logo

Leidos is an innovation company rapidly addressing the world's most vexing challenges in national security and health. Our 47,000 employees collaborate to create smarter technology solutions for customers in these critical markets.

View Profile View Profile