Incident Response Deputy Team Lead jobs in United States
cer-icon
Apply on Employer Site
company-logo

Leidos · 9 hours ago

Incident Response Deputy Team Lead

Leidos is seeking an experienced Incident Response professional to join their team in support of the U.S. Department of Homeland Security. The role involves managing day-to-day operations of the Incident Response team, conducting technical analysis, and coordinating responses to cyber incidents.

ComputerGovernmentInformation ServicesInformation TechnologyNational SecuritySoftware
badNo H1BnoteU.S. Citizen Onlynote

Responsibilities

Responsible for assisting the CIRT Team Lead with managing the team of CIRT analysts, Incident Response actions and priorities, technical analysis and root cause analyses, and interfacing with the customer
Partner with other task leads in support of customer initiatives and cyber incidents
Create dashboards for key metrics and processes and deliver technical presentations to various levels of customer leadership
Interface with senior DHS & CBP leaders and directors to help maintain and sustain critical systems supporting the CBP Security Operations Center
Utilize state of the art technologies such as host forensics tools(FTK/Encase), Endpoint Detection & Response tools, log analysis (Splunk) and network forensics (full packet capture solution) to perform hunt and investigative activity to examine endpoint and network-based data
Conduct in-depth analysis on hosts and networks, forensic analysis, log analysis, and triage in support of incident response
Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis, and incident response processes
Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes
Lead incident response activities and mentor junior SOC staff
Work with key stakeholders to implement remediation plans in response to incidents
Effectively investigative and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership
Flexible and adaptable self-starter with strong relationship-building skills
Ability to stay up to date with the latest threat intelligence, security trends, tools and capabilities
Possess strong problem-solving abilities with an analytic and qualitative eye for reasoning
Ability to independently prioritize and complete multiple tasks with little to no supervision
Effectively communicate with customer leadership and disseminate timely updates of critical incidents with emphasis on attention to detail and accurate reporting

Qualification

Incident Response LifecycleCyber Incident InvestigationsForensic AnalysisLog Analysis (Splunk)Scripting PythonScripting BashCreating PlaybooksCybersecurity CertificationsTechnical PresentationsRelationship BuildingProblem SolvingAttention to DetailCommunication Skills

Required

Bachelor's degree in a science or engineering field, IT, or Cybersecurity related field
5+ years of experience be in the areas of incident detection and response, remediation, malware analysis, or computer forensics
Ability to prioritize and complete multiple tasks with little to no supervision
Experience organizing, directing, and managing contract operation support functions involving multiple, complex, and interrelated project tasks
Experience effectively communicating at senior levels within a customer organization
Advanced knowledge of the Incident Response Lifecycle and applicability to various types of incidents and situations
Ability to collaborate with technical staff and customers to identify, assess, and resolve complex security problems/issues/risks and facilitate resolution and risk mitigation
Effective communication skills with emphasis on attention to detail, ability to accurately capture and document technical remediation details, and ability to brief stakeholders on incident statuses
Experience creating new processes, playbooks, and SOPs for new tools and workflows. Prior relevant experience should be in the areas of incident detection and response, malware analysis, or computer forensics
Ability to script in one more of the following computer languages Python, Bash, Visual Basic or PowerShell
Experience running cyber incident investigations with emphasis on attention to detail, adept communication skills, and adherence to defined escalation paths
All CBP SOC employees are required to currently possess a a CBP Background Investigation to support this program
The candidate should have at minimum ONE of the following certifications: CompTIA Cyber Security Analyst (CySA+), CompTIA Linux Network Professional (CLNP), CompTIA Pentest+, CompTIA Cybersecurity Analyst (CySA+), GPEN – Penetration Tester, GWAPT – Web Application Penetration Tester, GSNA – System and Network Auditor, GISF – Security Fundamentals, GXPN – Exploit Researcher and Advanced Penetration Tester, GWEB – Web Application Defender, GNFA – Network Forensic Analyst, GMON – Continuous Monitoring Certification, GCTI – Cyber Threat Intelligence, GOSI – Open Source Intelligence, OSCP (Certified Professional), OSCE (Certified Expert), OSWP (Wireless Professional), OSEE (Exploitation Expert), CCFP – Certified Cyber Forensics Professional, CISSP – Certified Information Systems Security, CEH – Certified Ethical Hacker, CHFI – Computer Hacking Forensic Investigator, LPT – Licensed Penetration Tester, CSA – EC Council Certified SOC Analyst (Previously ECSA – EC-Council Certified Security Analyst), ENSA – EC-Council Network Security Administrator, ECIH – EC-Council Certified Incident Handler, ECSS – EC-Council Certified Security Specialist, ECES – EC-Council Certified Encryption Specialist

Preferred

Experience in Federal Government, DOD or Law Enforcement in CND, CIRT or SOC role
Knowledge of the Cyber Kill Chain and the MITRE ATT&CK framework
Knowledge of Structured Analytic Techniques

Benefits

Health and Wellness programs
Income Protection
Paid Leave
Retirement

Company

Leidos is a Fortune 500® innovation company rapidly addressing the world’s most vexing challenges in national security and health.

Funding

Current Stage
Public Company
Total Funding
unknown
2025-02-20Post Ipo Debt
2013-09-17IPO

Leadership Team

leader-logo
James Carlini
Chief Technology Officer
linkedin
leader-logo
Theodore Tanner
Chief Technology Officer
linkedin
Company data provided by crunchbase