VA CSOC Cybersecurity Analyst
Are you a seasoned CYBERSECURITY ANALYST with a passion for safeguarding critical systems and ensuring the highest level of security in a dynamic and challenging environment? Leidos’ Military and Veterans Health Solutions (MVHS) is seeking a highly skilled and dedicated professional to join our team and play a vital role in enhancing, securing, and protecting the US Department of Veterans Affairs (VA) information and cybersecurity posture within the VA Cybersecurity Operations Center (CSOC) in Martinsburg, WV. As a Cybersecurity Analyst with the CSOC you will be responsible for providing Cybersecurity Incident Response and Handling Support. Your role will involve a wide range of responsibilities, including leading incident response efforts, actively monitoring VA solutions and tools, investigating anomalies, and collaborating with stakeholders to resolve cybersecurity incidents.
We are hiring for ALL SHIFTS.
*** Contingent upon contract award.
Monitoring and Analysis
Actively monitor VA solutions and tools for anomalies and alerts.
Analyze event and alert data, investigation reports, and forensic analysis reports.
Recommend enterprise protection measures based on incident trends and telemetry data.
Provide requirements for use-case creation and tuning of security monitoring and other tools.
Incident Management and Response
Lead all events and incidents from beginning to end.
Provide guidance and recommendations for incident containment, validation, and eradication.
Support incident remediation and recovery efforts.
Investigate and determine the nature of security events and alerts.
Confirm if an event meets the criteria of a cybersecurity incident.
Perform initial alert triage and create incident tickets.
Triage and assess the scope, urgency, and operational impact of incidents.
Utilize the Cybersecurity Threat Framework to classify incidents.
Analyze event and alert data to validate security incidents.
Create and update incident tickets with comprehensive information.
Follow incident notification escalation procedures.
Validate and assign severity levels to security events.
Identify event and incident correlations and suggest mitigation actions.
Create and provide incident reports for confirmed incidents.
Continuously update incident reports.
Provide final incident reports post-incident closure.
Coordinate with stakeholders to resolve cybersecurity incidents.
Monitor communication avenues for incident intake.
Documentation and Compliance
Populate all required fields in the ticket system.
Report all VA security-related incidents to CISA in accordance with Federal Incident Reporting Guidelines.
Update and maintain the CSOC Incident Response Playbook.
Utilize government-approved incident response use-case workflows and processes.
Daily review and update of all opened tickets.
Perform quality control reviews of incident tickets.
Provide deficiency reports and corrective actions.
Reporting and Documentation
Maintain incident contact lists and update the Master VA System Contact List.
Provide an Incident Response Executive After Action Report.
Provide audit support for various engagements.
Create, update, and maintain an Alert and Event Response Plan.
Provide recommendations to improve metrics within Cybersecurity Incident Response.
Provide incident/event/alert data for situational awareness reports.
Communication and Collaboration
Coordinate with external VA CSOC organizations.
Collaborate with the Government to improve incident response metrics.
Provide and develop a CSOC CIR Toolset Functionality Contingency Plan.
Support Cybersecurity Exercises and assessments.
Conduct a monthly review and verification of VA tickets submitted to CISA.
Track incident remediation and work with relevant stakeholders.
Must be able to obtain a Public Trust with a Tier 4/High Risk background investigation.
Bachelor’s degree in a relevant field and 4+ years of prior relevant experience or 8 years of relevant experience in lieu of degree.
Experience and expertise in enterprise-wide cybersecurity incident response and handling efforts and monitoring throughout the lifecycle of detection, investigation, confirmation, reporting, containment, and eradication of both suspected events and confirmed incidents.
Must have one or more of the following industry certifications in good standing:
EC-Council’s Certified Incident Handler (E|CIH)
GIAC Certified Incident Handler (GCIH)
Incident Handling & Response Professional (IHRP)
Certified Computer Security Incident Handler (CSIH)
Certified Incident Handling Engineer (CIHE)
EC-Council’s Certified Ethical Hacker (CEH)
Strong experience with security technologies including SIEM, SOAR, IDS/IPS, EDR, and network monitoring tools.
Excellent analytical and problem-solving skills.
Familiarity with NIST SP 800-61 and the MITRE ATT&CK framework
Ability to work independently and in a team environment.
Strong verbal and written communication skills.
Master’s degree in Information Technology, Computer Science, Information Systems, or related field.
Experience utilizing a ticket system such as ServiceNow
Join our team and make a significant impact on the security and well-being of the nation's veterans. If you are a proactive, highly skilled cybersecurity professional who thrives in a fast-paced environment, we encourage you to apply!
Pay Range:Pay Range $78,000.00 - $141,000.00
The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.