02 Dec
Cyber Network Defense Analyst
District of Columbia, Washington , 20090 Washington USA

Vacancy expired!

Description Job Description:Leidos is seeking a Cyber Network Defense Analyst to join our team on a highly visible cyber security single-award IDIQ vehicle that provides security operations center (SOC) support, cyber analysis, application development, and a 24x7x365 support staff. The Monitoring and Analysis team provide 24x7 support across 4 different shifts. We have Front half shifts (day and night) and back half shifts (day and night). The front half shift will work 12 hour shifts from Sunday - Tuesday and alternating Wednesdays. The back half shift will work 12 hour shifts from Thursday - Saturday and alternating Wednesdays. Candidates must have the ability to work non-core hours, if necessary.Duties include network security monitoring and detection. Proactively searching for threats. Inspect traffic for anomalies and new malware patterns. Investigate and analyze logs. Provide analysis and response to alerts, and document activity in SOC investigations and Security Event Notifications (SENs).Primary Responsibilities

  • Utilize a SIEM for enterprise monitoring and detection
  • Create Security Event Notifications to document investigation findings
  • Perform critical thinking and analysis to investigate cyber security alerts
  • Analyze network traffic using enterprise tools (e.g. Full PCAP, Firewall, Proxy logs, IDS logs, etc)
  • Collaborate with team members to analyze an alert or a threat
  • Stay up to date with latest threats
  • Monitor shared email box for notifications and requests
  • Utilize OSINT to aid in their investigation
  • Contribute to content tuning requests
  • Have familiarity with dynamic malware analysis and experience analyzing malicious websites
  • Have experience performing analysis of network traffic, host logs, and correlating diverse security logs to perform recommendations for response
  • Utilize the Cyber Kill Chain in their analysis
  • Review and provide feedback to junior analysts' investigation
  • Review and implement network/host counter measures
  • Contribute to SOP/brown bag development and updating
  • Attend briefings and take appropriate actions to defend the enterprise
  • Help cross train junior analyst
  • Contribute to content tuning and development in coordination with tier 3 analysts
  • Understanding of security tools such as IDS, IPS, Proxy, Firewall, Antivirus, DLP
  • Working knowledge of Windows OS and standard system logs
Basic QualificationsAll Cyber Network Defense Analyst candidates shall have a bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field AND a minimum of 4+ years professional experience in one or more of the areas listed below:
  • Incident Detection and Response
  • Malware Analysis
  • Cyber Forensics
The ideal candidate is a self-motivated individual in pursuit of a career in cyber security.Candidates must have extensive experience working with various security methodologies and processes, advanced knowledge of TCP/IP protocols, experience configuring and implementing various of technical security solutions, extensive experience providing analysis and trending of security log data from a large number of heterogeneous security devices, and must possess expert knowledge in two or more of the following areas related to cybersecurity:
  • Vulnerability Assessment
  • Intrusion Prevention and Detection
  • Access Control and Authorization
  • Policy Enforcement
  • Application Security
  • Protocol Analysis
  • Firewall Management
  • Incident Response
  • Encryption
  • Web-filtering
  • Advanced Threat Protection
Must have at least one of the following certifications:
  • SANS GIAC: GCIA, GCIH, GCFA, GPEN, GWAPT, GCFE, GREM, GXPN, GMON, GISF, or GCIH
  • EC Council: CEH, CHFI, LPT, ECSA
  • ISC2: CCFP, CCSP, CISSP CERT CSIH
  • Offensive Security: OSCP, OSCE, OSWP and OSEE
Must have current TS/SCI. In addition to specific security clearance requirements, all Department of Homeland Security SOC employees are required to obtain an Entry on Duty (EOD) clearance to support this program. Desired skills:
  • Knowledgeable about security methodologies and SOC processes
  • Experienced working in a SOC and supporting SOC operations
  • Knowledgeable about network ports and protocols (e.g. TCP/UDP, HTTP, ICMP, DNS, SMTP, etc)
  • Experienced with network topologies and network security device functions (e.g. Firewall, IDS/IPS, Proxy, DNS, etc).
  • Experience analyzing PCAPs and network logs.
  • Knowledge of common end user and web application attacks and countermeasures against the attack
  • Experience training and mentoring junior analysts
  • Knowledgeable of common end user and web application attacks
  • Experience creating SOP and providing guidance to junior analyst
  • Understanding of APTs and TTPs
  • Able to extrapolate data to pivot and take actions as necessary
  • Perform critical thinking and analysis to investigate cyber security alerts
  • Experience in a scripting language (e.g. python, powershell, Javascript, VBS etc)
  • Familiarity with cloud (e.g. o365, Azure, AWS, etc) security monitoring
  • Hands-on experience utilizing network security tools (e.g. IDS/IPS, Full PCAP, WAF, etc) and SIEM
  • Experience creating SIEM and/or IDS content
  • Experience with creating custom SPL
  • Understanding of various Threat Intel Frameworks (e.g. CKC, MITRE ATT&CK, Diamond model, etc)
Pay Range:

Vacancy expired!


Report job