Senior Cyber Defense Analyst
6314 Remote/Teleworker US
This is an opportunity to join a team of highly skilled and innovative network defenders, and the best group of individuals out there. Leidos’ Cybersecurity Intelligence and Response Team (CSIRT) has an immediate opening for a motivated Cyber Defense Analyst. Leidos is an international company made up of 47,000 employees that provides Defense, Intelligence and Health Products to our customers. Our goal is to stay ahead of, and maintain a technical advantage over our adversaries using the latest technical advancements, including custom built cybersecurity capabilities. As a key part of the team, your responsibilities will include threat hunting, and tactical analysis of ongoing attacks by criminal and nation state actors. You will perform data analysis, incident response, investigative analysis, and research on existing and emerging cyber threats, particularly those directed against Leidos' global networks. You will be expected to "think like an adversary" and engage in threat hunting operations leveraging your understanding of the tactics, techniques and procedures employed by advanced threats combined with intelligence from multiple sources, and provide reporting and briefings to other teams and leadership in order to maintain appropriate levels of situational awareness. In this position, you will have the ability to grow through training opportunities, conferences and collaboration with industry peers and adjacent parts of our business. You will be challenged and provided a tremendous opportunity for growth in a highly collaborative and supportive environment.
PRIMARY RESPONSIBILITIES
- Analyze network and host activity associated with both successful and unsuccessful intrusions by advanced attackers.
- Perform network traffic analysis utilizing raw packet data, net flow, IDS, and custom sensor output.
- Support enterprise incident response efforts
- Leverage understanding of tactics, techniques and procedures associated with advanced threats to create and add custom signatures that mitigate highly dynamic threats to the enterprise.
- Employ advanced forensic tools and techniques for attack reconstruction and intelligence gathering.
- Proactively research emerging cyber threats. Apply analytical understanding of attacker methodologies and tactics, system vulnerabilities, and key indicators of attacks and exploits.
- Contribute to threat intelligence reports and briefings that provide situational awareness of cyber threats impacting the company's global network infrastructure, to every level of the organization.
- Participate in threat hunt operations using known adversary tactics, techniques and procedures, as well as indicators of attack, in order to detect advanced threats to the enterprise.
- Collaborate using information and knowledge sharing networks and professional relationships to achieve common goals.
- Provide on-call support for incident response efforts outside of core hours, as needed.
- Mentor junior analysts technically and conceptually
- Collect, create and disseminate threat intelligence
- Lead small groups within the team for discernable tasks, including projects and incident response
- Drive advanced countermeasures through to completion
- Understanding and educating the team about defending new threat vectors
REQUIRED QUALIFICATIONS
- BS Degree and 8-12 years relevant experience in cyber security or network defense; or 7-11 years relevant experience with relevant certifications (CISSP, SANS GIAC, CEH, etc.)
- Experience in conventional network\host-based intrusion analysis, digital forensics, or malware analysis.
- Experience performing "deep dive" analysis and correlation of log data from multiple sources including PCAP and forensic artifacts.
- Experience leading and contributing to incident response activities
- Strong understanding of Operating Systems and Network Protocols.
- Proficiency with Microsoft Windows administrative tools, and the Unix/Linux command line.
PREFERRED QUALIFICATIONS
- Understanding of behavioral based threat models, including ATT&CK, Cyber Kill Chain, Diamond Model, etc.
- Experience with Splunk (preferred) or other SIEM-type platform
- Capable and comfortable communicating actionable threat intelligence to both technical and executive-level stakeholders.
- Familiarity with common languages (like Perl and Python) to parse logs, automate processes, and integrate systems.
- Previous experience as Threat Researcher and/or Intelligence Analyst.
- Experience with dynamic malware analysis, and reverse engineering.
- Experience in cryptography or cryptanalysis
- Experience in cyber security engineering
- Experience defending large cloud infrastructures (AWS, Azure, etc.)
- Ability to create, modify, and implement both Snort and YARA signatures.
- Published research papers at conferences or through other mediums (blogs, articles).
- Working knowledge of Computer Network Exploitation (CNE), Computer Network Attack (CNA) and Computer Network Defense (CND) tools and techniques.
- A deep understanding of advanced cyber threats targeting enterprises, along with the tools, tactics, and procedures used by those threats.
- Experience applying threat and data modeling, advanced data correlation, and statistical analysis to develop alerts, notable events, investigative dashboards, and metrics driven reports.
Original Posting Date:
2024-12-03While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Pay Range:
Pay Range $101,400.00 - $183,300.00The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
ApplyJob Profile
Remote/Teleworker US
Benefits/PerksCollaboration Collaborative environment Conferences Growth Opportunities Opportunity for growth Supportive environment Training Training opportunities
Tasks- Analysis
- Analyze network activity
- Automate processes
- Collaboration
- Contribute to threat intelligence reports
- Data Analysis
- Develop
- Implement
- Incident response
- Lead small groups
- Maintain
- Mentor junior analysts
- Modeling
- Participate in threat hunt operations
- Perform network traffic analysis
- Provide on-call support
- Reporting
- Research
- Research emerging threats
- Statistical analysis
- Support incident response
Advanced Threats Analysis Analytical AWS Azure Business CISSP Cloud CND Collaboration Compensation Computer Cryptography Custom Signatures Cyber Cybersecurity Cyber Security Data Data analysis Data Modeling Digital Forensics Education Engineering Forensic tools IDS Incident Response Infrastructure Investigative Analysis Leadership Linux Log Data Correlation Malware Analysis Microsoft Microsoft Windows Modeling Network Network Defense Network Infrastructure Network protocols Network Traffic Analysis Operating Systems Operations Organization Perl Python Reporting Research Reverse Engineering Security Security Engineering SIEM Splunk Statistical analysis Support Tactics Techniques Procedures Teams Technical Threat Hunting Threat Intelligence Training UNIX Windows
Experience8-12 years
EducationAS B.S. degree Business Cyber security Degree Engineering Security Technical
CertificationsAWS CEH CISSP CND SANS SANS GIAC
TimezonesAmerica/Anchorage America/Chicago America/Denver America/Los_Angeles America/New_York Pacific/Honolulu UTC-10 UTC-5 UTC-6 UTC-7 UTC-8 UTC-9