R- Attack Sensing & Warning Analyst (AS&W Analyst) Job at Leidos, Illinois

cko2aXplN0lYNHByWEJMdEFRZVlRV08rMHc9PQ==
  • Leidos
  • Illinois

Job Description

The U.S. Department of Homeland Security (DHS) Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible to prevent identify contain and eradicate cyber threats to CBP networks through monitoring intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN) commercial Internet connection public facing websites wireless mobile/cellular cloud security devices servers and workstations. The CBP SOC is responsible for the overall security of CBP Enterprise-wide information systems and collects investigates and reports any suspected and confirmed security violations.

Leidos is seeking an experienced Tier 2 Attack Sensing & Warning Analyst to join our team. As a member of the AS&W team supporting U.S. Customs and Border Protection (CBP) you will be responsible for l everaging advanced security technologies including EDR SIEM and network security tools to monitor triage and investigate endpoint and network activity escalating alerts in accordance with established playbooks and procedures analyz ing logs and attacker behaviors to identify APT tactics aggregat ing IOCs and develop ing security content scripts and tools that enhance detection and incident response capabilities in support of the protection of the customers systems networks and assets.

Primary Responsibilities:

Shift schedule: 7 a m-7 p m Sun - Tues every other Wednesday.

  • Utilize state of the art technologies such as Endpoint Detection & Response (EDR) tools log analysis (Splunk) and occasionally network forensics (full packet capture solution) to investigative activity to examine endpoint and network-based data.

  • Monitor alerting channels for multiple endpoint and network tools for alerts of various criticalities and escalate according to defined processes procedures and playbooks.

  • Triage alerts to determine nature of activity occurring on customer networks systems servers and mobile devices.

  • Conduct log analysis from multiple avenues and tools to triage activity in support of incident response.

  • Recognize attacker and APT activity tactics and procedures a nd aggregate indicators of compromise (IOCs) that can be used to improve monitoring analysis and incident response.

  • Develop and build security content scripts tools or methods to enhance the incident investigation processes.

  • Lead I ncident Response activities and mentor junior SOC staff.

  • Create daily weekly and monthly reports for dissemination to customer leadership with emphasis on attention to detail and accurate capturing of relevant timely data for briefings.

  • S uccinctly and accurately capture technical details and summarize findings for less technical audiences.

  • Work with key stakeholders to implement remediation plans in response to incidents.

  • Effectively investigative and identify root cause findings then communicate findings to stakeholders including technical staff and leadership.

  • Strong problem-solving abilities with an analytic and qualitative mindset.

  • Effectively communicate with customer leadership and disseminate timely updates of critical incidents with emphasis on attention to detail and accurate reporting.

Basic Qualifications:

  • Bachelors degree in computer science e ngineering Information Technology (IT) Cyber Security or related field and 2 4 or 8 years of professional experience (depending on level). Additional years of experience are accepted in lieu of degree.

  • 5 years of professional experience (or a Bachelors Degree and 3 years of professional experience) in incident detection response and remediation .

  • Minimum of three (3) but (5) preferred years of specialized experience in one or more of the following areas:

  • Email security

  • Digital media forensic

  • Monitoring and detection

  • Incident Response

  • Vulnerability assessment and penetration testing

  • Cyber intelligence analysis

  • Extensive experience analyzing and synthesizing information with other relevant data sources providing guidance and mentorship to others in cyber threat analysis and operations .

  • Ability to collaborate with technical staff and customers to identify assess and resolve complex security problems/issues/risks and facilitate resolution and risk mitigation.

  • Ability to stay up to date with the latest threat intelligence security trends tools and capabilities .

  • Possess s trong problem-solving abilities with an analytic and qualitative eye for reasoning .

  • Ability to independently prioritize and complete multiple tasks with little to no supervision.

Preferred Qualifications:

  • Ability to coordinate and communicate well with team leads and government personnel.

  • Experience with detection engineering efforts to tune alerts signatures and tools to reduce false positives.

  • Experience in cyber government and/or federal law enforcement

  • Experience with the Cyber Kill Chain and MITRE ATT&CK framework

  • Ability to formulate and create new processes metrics and procedures to improve security operations .

  • Must be able to report into the office as many as 5 days per week in Ashburn VA

Required certifications:

The candidate should have at minimum ONE of the following certifications:

  • CompTIA Cyber Security Analyst ( CySA )

  • CEH Certified Ethical Hacker

  • CompTIA Linux Network Professional (CLNP)

  • CompTIA Pentest

  • CompTIA Cybersecurity Analyst ( CySA )

  • GPEN Penetration Tester

  • GWAPT Web Application Penetration Tester

  • GSNA System and Network Auditor

  • GISF Security Fundamentals

  • GXPN Exploit Researcher and Advanced Penetration Tester

  • GWEB Web Applicatio n Defender

  • GNFA Network Forensic Analyst

  • GMON Continuous Monitoring Certification

  • GCTI Cyber Threat Intelligence

  • GOSI Open Source Intelligence

  • OSCP (Certified Professional)

  • OSCE (Certified Expert)

  • OSWP (Wireless Professional)

  • OSEE (Exploitation Expert)

  • CCFP Certified Cyber Forensics Professional

  • CISSP Certified Information Systems Security

  • CHFI Computer Hacking Forensic Investigator

  • LPT Licensed Penetration Tester

  • CSA EC Council Certified SOC Analyst (Previously ECSA EC-Council Certified Security Analyst)

  • ENSA EC-Council Network Security Administrator

  • ECIH EC-Council Certified Incident Handler

  • ECSS EC-Council Certified Security Specialist

  • ECES EC-Council Certified Encryption Specialist

Clearance:

All Department of Homeland Security CBP SOC employees are required to favorably pass a 5-year (BI) Background Investigation

If youre looking for comfort keep scrolling. At Leidos we outthink outbuild and outpace the status quo because the mission demands it. Were not hiring followers. Were recruiting the ones who disrupt provoke and refuse to fail. Step 10 is ancient history. Were already at step 30 and moving faster than anyone else dares.

Original Posting:

March 4 2026

For U.S. Positions: While subject to change based on business needs Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.

Pay Range:

Pay Range $87100.00 - $157450.00

The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job education experience knowledge skills and abilities as well as internal equity alignment with market data applicable bargaining agreement (if any) or other law.

Required Experience:

IC

Job Tags

Full time, Work at office, Local area, Shift work

Similar Jobs

Harrison Consulting Solutions

Civil Project Manager (Airport) Job at Harrison Consulting Solutions

 ...highly rewarding opportunity for a Senior Civil Project Manager (Airport)looking to join the team in Minneapolis! This is a hybrid...  ...the country including small general aviation airports, large international commercial airports, and military bases Attend industry related... 

Confidential

Staff Writer Job at Confidential

 ...signalscv.com) is looking for general assignment reporters both printand broadcast. Candidates must be passionate about community journalism andflexible in assignments including breaking news, government/politics, featuresand special projects. Multimedia capabilities... 

Aequor

R&D Technician I Job at Aequor

Title: Research TechnicianOngoing project year over year; no tenure.Training ScheduleTraining is up to 3 months. This is usually 3 days a week onsite from 6:30am - 3:00pm. Once they complete training, the working hours will fluctuate from 0 hours a week up to 40 hours a...

Astrix Inc

Junior Computational Biologist (Remote) Job at Astrix Inc

 ...Pay Rate Low: 30 | Pay Rate High: 34 A leading biotechnology research organization is seeking a Junior Computational Biologist to support efforts in refining how cellular states are quantified and validated! Title: Jr. Computational Biologist (Remote Contract)... 

Multimedia Solutions Corp.

Join us for a Digital Marketing Internship Job at Multimedia Solutions Corp.

Join us for a Digital Marketing InternshipAre you interested in helping to transform the way people communicate?At Multimedia...  ...space. We are also excited to glean fresh ideas and insights that interns can bring to the table.Digital Marketing Interns will be...