Security Analyst SME ( R-00059762 )
The Defense Group at Leidos is currently seeking a Senior Cyber Security Analyst to join the team in Adelphi, MD.
This position provides Subject Matter Expert Cyber Security Analysis and technical leadership to C5ISR Center Sustaining Base Network Assurance Branch (SBNAB) Defensive Cyber Operations (DCO) Security Operations Center (SOC). Beyond advising and guiding technical matters, this position is tasked with driving implementation and adoption of new tools, research, capabilities, frameworks, and methodologies while ensuring those already in use are implemented, utilized properly, and improved.
- Provide technical leadership and supervision to Tier III Cyber Security Analysts
- Identify and offer solutions to gaps in capabilities and visibility
- Promote and drive research and implementation of automation and process efficiencies
- Expert at operating in a command-line environment, to include chaining utilities, complex commands integration of tcpdump to analyze novel protocols, IP protocols, and protocols outside the scope of IDS operation or detection
- Advanced Snort capabilities, to include identifying flaws in existing rules, customization and optimization, correction of third party rules, review and correction of Tier I and Tier II rules
- Basic scripting and development to fill capabilities gaps
- Generate and maintain technical documentation for retaining institutional knowledge
- Ability to critically read and update technical documentation with regular, periodic reviews to ensure currency
- Periodic and systematic review of indicators and rules to ensure the IDS is up to date and streamlined, with non-relevant indicators being cleared
- Ability to analyze new or novel system logs or network traffic and to make meaningful hypotheses about them, absent corresponding open source information available
- Able to explain complex technical topics in layman's terms to effectively communicate with nontechnical participants
- Operationalize projects such as new tools moved into production, new detection methods shared with the DoD community
- Daily consumption of domestic and international news from multiple sites, awareness of the differing biases / slants in presentation of the sites, able to conduct additional research for historical context into particular international situations in order to drive analysis
- Bachelor's degree and 12+ years of prior IT experience, or Associate degree with 15+ years of experience.
- 5+ years’ experience working in a SOC environment
- DoD 8570 IAT III certifications required prior to starting
- Tier III Analysts shall possess a minimum of 6 years on-the-job analytical or technical experience in Tier I and II requirements plus the responsibilities outlined above.
- Prior experience supervising employees of various labor categories and skills in efforts similar in size and scope to the SBNAB DCO program
- Advanced knowledge of solution development techniques and best practices related to demonstration, pilot, and test management and operations.
- Demonstrated advanced knowledge of industry accepted standards.
- Demonstrated experience with researching and fielding new and innovative technology;
- Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic finding.
- Strong analytical and troubleshooting skills.
- Must be a US Citizen.
- Candidate must possess an active TS/SCI, or a Top Secret clearance with a current SSBI, and be eligible to obtain a TS/SCI clearance.
- Deep technical understanding of core current cybersecurity technologies as well as emerging capabilities.
- Hands-on cybersecurity experience (Protect, Detect, Respond or Sustain) within a Computer Incident Response organization.
- Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs).
- Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings.
- Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework.