Description The U.S. Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial internet connection, public facing websites, wireless, mobile/cellular, various cloud environments, security devices, servers and workstations. The CBP SOC is responsible for the overall security of CBP Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations. Primary Responsibilities:
Will conduct cyber threat analysis, identifying mitigation and/or remediation courses of action; developing actionable intelligence used to protect organizational IT assets; and trending cyber threat metrics for leadership situational awareness. Responsible for maintaining a comprehensive understanding of the cyber threat landscape, including identifying and analyzing cyber threats actors and/or activities to enhance cybersecurity posture of an the organization's IT operating environment. Identify, track and investigate, and write technical products for dissemination to stakeholders regarding high priority threat campaigns, malicious actors, APTs, emerging threats, etc. Bring a comprehensive understanding, analyzing and tracking the cyber threat landscape, including identifying and analyzing cyber threats actors, APT TTPs and/or activities to enhance cybersecurity posture of the organization's IT operating environment. Provide support to the Security Operations Center during incident response and threat intelligence activities that includes cyber threat analysis support, research, recommending relevant remediation and mitigation. Will be responsible for developing scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, C++, HTML, XML or other type most appropriate for the task. Conduct trending and correlation of various cyber intelligence sources for the purposes of indicator collection, shifts in TTPs, attribution and establishing countermeasures to increase cyber resiliency
Will be responsible for:
Producing high quality technical and non-technical products, briefings, whitepapers, etc., with minimal supervision and emphasis on effective/accurate reporting on product topics. Maintain situational awareness of emerging threats, zero days, vulnerabilities and other threats against customer systems, networks, and assets. Process technical data from various sources and fuse the data with intelligence reporting to improve the security posture of the customer, as well as manage Threat Intelligence tools security tools such as Analyst1.
Basic Qualifications:
BS in IT related field or higher and 8-12 years' experience in an information technology field with a minimum of 5 years of experience as a Tier II senior cyber security analyst performing intelligence analysis, collection management, and technical analysis. Additional years of experience and/or security certifications may be substituted in lieu of a degree. 5+ years of recent experience with host-based and network-based security monitoring solutions and to include security content recommendation or development (host based and network signatures). 2 years recent experience with host-based and network-based security monitoring using cybersecurity capabilities. Must be experienced developing scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, C++, HTML, XML or other. Ability to work independently with minimal direction; self-starter/self-motivated
Required certifications: The candidate should have at minimum ONE of the following certifications:
Certified Information System Security Professional (CISSP). SANS - GCIA - Intrusion Analyst SANS - GREM - Reverse Engineering Malware SANS - GISF - Security Fundamentals SANS - GXPN - Exploit Researcher and Advanced Penetration Tester SANS - GMON - Continuous Monitoring Certification OSCP (Certified Professional) OSCE (Certified Expert) OSWP (Wireless Professional) OSEE (Exploitation Expert) CCSP - Certified Cloud Security Professional LPT - Licensed Penetration Tester ECSA - EC-Council Certified Security Analyst Cyber Analyst Couse
Preferred Qualifications:
A minimum of five (5) years of hands-on experience with experience in the last two (2) years that includes host-based and network based security monitoring using cybersecurity capabilities. Previous DOD, IC or Law Enforcement Intelligence or Counter Intelligence Training/Experience Knowledge of Structured Analytic Techniques Degree in Applied Intelligence or Advanced Degree in Cyber Security or related field.
Clearance:
Original Posting Date:2024-10-25
While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Pay Range:Pay Range $101,400.00 - $183,300.00
The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
|