Incident Response Analyst
Role details
Job location
Tech stack
Requirements
Bachelors' degree in Computer Science, Engineering, Information Technology, Cyber Security, or related field and 12-15 years of related experience. Additional years of experience and/or cyber certifications may be considered in lieu of degree.\n \n In-depth knowledge of each phase of the Incident Response life cycle\n \u2022 Expertise of Operating Systems (Windows/Linux) operations and artifacts\n \u2022 Expertise of Enterprise Network Architectures to include routing/switching, common protocols (DHCP, DNS, HTTP, etc), and devices (Firewalls, Proxies, Load Balancers, VPN, etc)\n \u2022 Ability to recognize suspicious activity/events, common attacker TTPs, and perform logical analysis and research to determine root cause and scope of Incidents\n \u2022 Expertise with Cyber Kill Chain and have utilized the ATT&CK Framework\n \u2022 Have scripting experience with Python, PowerShell, and/or Bash\n \u2022 Ability to independently prioritize and complete multiple tasks with little to no supervision\n \u2022 Flexible and adaptable self-starter with strong relationship-building skills\n \u2022 Strong problem-solving abilities with an analytic and qualitative eye for reasoning\n \u2022 Strong verbal and written communication skills\n \u2022 Ability to communicate with all levels of audiences (subordinates, peers & leadership)\n, * Candidate must have technical hands on experience in the areas of incident detection and response, malware analysis, or computer forensics.\n
Benefits & conditions
n \nAt Leidos, we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customers' success. We empower our teams, contribute to our communities, and operate sustainable. Everything we do is built on a commitment to do the right thing for our customers, our people, and our community. Our Mission, Vision, and Values guide the way we do business.\n \n \nIf this sounds like the kind of environment where you can thrive, keep reading!\n \n \nThe Digital Modernization Sector brings together our digital transformation and IT programs, allowing us to better serve our customers through scale and repeatability. Leidos has a critical need for a Senior Incident Response Analyst to support the DHS CISA Program.\n \n The Department of Homeland Security (DHS), Security Operations Center (SOC) Support Services is a US Government program responsible to monitor, detect, analyze, mitigate, and respond to cyber threats and adversarial activity on the DHS Enterprise. The DHS SOC has primary responsibility for monitoring and responding to security events and incidents detected at the Trusted Internet Connection (TIC) and Policy Enforcement Point (PEP) and is responsible for directing and coordinating detection and response activities performed by each Component SOC. Direction and coordination are achieved through a new shared DHS incident tracking system and other means of coordination and communication. Leidos is seeking a Senior Incident Response Analyst to join our team on this highly visible DHS CISA SOC Program.\n \n The Incident Responder will perform the following:\n \u2022 Coordinate investigation and response efforts throughout the Incident Response lifecycle\n \u2022 Correlate and and analyze events and data to determine scope of Cyber Incidents\n \u2022 Acquire and analyze endpoint and network artifacts, volatile memory, malicious files/binaries and scripts\n \u2022 Recognize attacker tactics, techniques, and procedures as potential indicators of compromise (IOCs) that can be used to improve monitoring, analysis and Incident Response.\n \u2022 Develop, document, and maintain Incident Response process, procedures, workflows, and playbooks\n \u2022 Tune and maintain security tools (EDR, IDS, SIEM, etc) to reduce false positives and improve SOC detection capabilities\n \u2022 Document Investigation and Incident Response actions taken in Case Management Systems and prepare formal Incident Reports\n \u2022 Create metrics and determine Key Performance Indicators to drive maturity of SOC operations\n \u2022 Develop security content such as scripts, signatures, and alerts\n \n