Leidos · 5 hours ago
Incident Response Analyst
Maximize your interview chances
ComputerGovernment
Actively HiringNo H1B
Insider Connection @Leidos
Get 3x more responses when you reach out via email instead of LinkedIn.
Responsibilities
Coordinate investigation and response efforts throughout the Incident Response lifecycle
Correlate and and analyze events and data to determine scope of Cyber Incidents
Acquire and analyze endpoint and network artifacts, volatile memory, malicious files/binaries and scripts
Recognize attacker tactics, techniques, and procedures as potential indicators of compromise (IOCs) that can be used to improve monitoring, analysis and Incident Response.
Develop, document, and maintain Incident Response process, procedures, workflows, and playbooks
Tune and maintain security tools (EDR, IDS, SIEM, etc) to reduce false positives and improve SOC detection capabilities
Document Investigation and Incident Response actions taken in Case Management Systems and prepare formal Incident Reports
Create metrics and determine Key Performance Indicators to drive maturity of SOC operations
Develop security content such as scripts, signatures, and alerts
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
In-depth knowledge of each phase of the Incident Response life cycle
Expertise of Operating Systems (Windows/Linux) operations and artifacts
Understanding of Enterprise Network Architectures to include routing/switching, common protocols (DHCP, DNS, HTTP, etc), and devices (Firewalls, Proxies, Load Balancers, VPN, etc)
Ability to recognize suspicious activity/events, common attacker TTPs, and perform logical analysis and research to determine root cause and scope of Incidents
Be familiar with Cyber Kill Chain and have utilized the ATT&CK Framework
Have scripting experience with Python, PowerShell, and/or Bash
Ability to independently prioritize and complete multiple tasks with little to no supervision
Flexible and adaptable self-starter with strong relationship-building skills
Strong problem-solving abilities with an analytic and qualitative eye for reasoning
Strong verbal and written communication skills
Ability to communicate with all levels of audiences (subordinates, peers & leadership)
All Department of Homeland Security SOC employees are required to favorably pass a 5-year (BI) Background Investigation
Experience in the areas of incident detection and response, malware analysis, or computer forensics
Bachelors’ degree in Computer Science, Engineering, Information Technology, Cyber Security, or related field and 8-12 years of related experience
Additional years of experience and cyber certifications may be considered in lieu of degree
Should Have At Least One Of The Following Certifications: SANS GIAC: GCIH, GCIA, GCFA, GPEN GCFE, GREM, CISSP OSCP, OSCE, OSWP
Preferred
Experience in cyber government, and/or federal law enforcement FISMA systems
Company
Leidos
Leidos is a Fortune 500® innovation company rapidly addressing the world’s most vexing challenges in national security and health.
Funding
Current Stage
Public CompanyTotal Funding
unknown2013-09-17IPO· nyse:LDOS
Leadership Team
Recent News
2024-11-16
2024-11-15
Company data provided by crunchbase