Incident Response Analyst

$101,400 - $183,300/Yr

Leidos - Ashburn, VA

posted 7 days ago

Full-time - Mid Level
Ashburn, VA
Professional, Scientific, and Technical Services

About the position

The Incident Response Analyst at Leidos plays a crucial role in supporting the Network Operations Security Center (NOSC) Security Operations Center (SOC). This position involves managing and responding to cybersecurity incidents, utilizing a deep understanding of incident response life cycles, operating systems, and enterprise network architectures. The analyst will drive improvements in tools and methodologies while promoting best practices in cybersecurity analysis and incident response.

Responsibilities

  • Manage and respond to incidents throughout the Incident Response life cycle.
  • Analyze operating systems (Windows/Linux) operations and artifacts.
  • Understand and analyze enterprise network architectures, including routing/switching and common protocols.
  • Recognize suspicious activities and events, and perform logical analysis to determine the root cause of incidents.
  • Implement and improve new tools, capabilities, frameworks, and methodologies for incident response.
  • Instill industry best practices in incident response and SOC operations.
  • Promote automation and process efficiencies within the SOC.
  • Provide guidance and mentorship to junior analysts to enhance their skills.
  • Establish trust and business relationships with customers and stakeholders.

Requirements

  • Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field.
  • 8-12 years of experience in incident detection and response, malware analysis, or cyber forensics.
  • Must have TS/SCI security clearance and obtain an Entry on Duty (EOD) clearance.
  • Deep technical understanding of current cybersecurity technologies and emerging capabilities.
  • 8+ years of intrusion detection and/or incident handling experience.
  • CISSP and SANS GCIH or GCIA certifications required upon start.
  • Advanced knowledge in managing Computer Incident Response Team (CIRT) and/or Security Operations Center (SOC) operations.
  • Experience supervising and leading diverse teams in a mature Security Operation environment.
  • Strong written and verbal communication skills, with the ability to create technical reports.

Nice-to-haves

  • Hands-on cybersecurity experience within a Computer Incident Response organization.
  • Understanding of the life cycle of cybersecurity threats and attack vectors.
  • Familiarity with Intelligence Driven Defense and Cyber Kill Chain methodology.
  • Experience monitoring and responding to threats in Cloud environments.

Benefits

  • Competitive salary range of $101,400.00 - $183,300.00 based on experience and qualifications.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service