Mid Level Cyber Subject Matter Expert Office of the Cyber Executive ( R-00067920 )
The Intelligence Group of Leidos is seeking a Mid-Level Cyber Subject Matter Expert to support an Intelligence Community (IC) program in Northern Virginia. An Active TS/SCI with polygraph security clearance is required for this position. The candidate will support Government staff in developing a broad range of written products in support of senior leadership and USG policymakers.
Advise the Office of the Cyber Executive (OCX) on key development in their assigned area requiring both immediate and long term analytical and collection response by the IC.
Leads investigation, clean up, and reporting of all malware infections, suspicious files, and other issues
Analyzes all relevant cyber security event data and other sources for attack indicators and potential security breaches
Produces reports, assists in the coordination during incidents, and coordinates with the Network Defense O&M to ensure all security monitoring systems are on-line, up to date and operational
Monitors security events and provides analysis and correlation, situational awareness level reports and trending reports
Provides effective incident response capabilities, usable and effective reports that address overall situational awareness
Maximizes the use of tools to correlate information and synthesize data into usable and actionable events
Active TS/SCI with polygraph
BA degree and 8 – 12 years of prior relevant experience or Masters with 6 – 10 years of prior relevant experience. Experience can be substituted for degree.
5 Years work experience related to the technical requirement.
1 year working with or in the IC.
Analytical experience in cyber intelligence/cyber security issues.
Significant demonstrated analytic skills, tradecraft experience, or extensive publication on the subject as a noted expert in the field.
Demonstrated ability to coordinate and support cross-community meetings and working groups, assimilate large volumes of information and independently produce written reports.
Board certified in relevant security programs (e.g., CISSP, CISM, CISA, CEH, NCSF, CAP, etc.)
Experience with compliance and vulnerability scanning tools (e.g.,XACTA, RedSeal, Nessus, Splunk, McAfee ePO, and/or other vulnerability scanners)