採用
The U.S. Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations. The CBP SOC is responsible for the overall security of CBP Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations.
Leidos is seeking an experienced Tier 2 Attack Sensing & Warning Analyst to join our team. As a member of the AS&W team supporting U.S. Customs and Border Protection (CBP), you will be responsible for leveraging advanced security technologies including EDR, SIEM, and network security tools to monitor, triage, and investigate endpoint and network activity, escalating alerts in accordance with established playbooks and procedures, analyzing logs and attacker behaviors to identify APT tactics, aggregating IOCs, and developing security content, scripts, and tools that enhance detection and incident response capabilities in support of the protection of the customers’ systems, networks, and assets.
Primary Responsibilities:
Shift schedule: 7am-7pm, Sun-Tues, every other Wednesday.
-
Utilize state of the art technologies such as Endpoint Detection & Response (EDR) tools, log analysis (Splunk) and occasionally network forensics (full packet capture solution) to investigative activity to examine endpoint and network-based data.
-
Monitor alerting channels for multiple endpoint and network tools for alerts of various criticalities and escalate according to defined processes, procedures, and playbooks.
-
Triage alerts to determine nature of activity occurring on customer networks, systems, servers, and mobile devices.
-
Conduct log analysis from multiple avenues and tools to triage activity in support of incident response.
-
Recognize attacker and APT activity, tactics, and procedures and aggregate indicators of compromise (IOCs) that can be used to improve monitoring, analysis and incident response.
-
Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes.
-
Lead Incident Response activities and mentor junior SOC staff.
-
Create daily, weekly, and monthly reports for dissemination to customer leadership with emphasis on attention to detail and accurate capturing of relevant, timely data for briefings.
-
Succinctly and accurately capture technical details and summarize findings for less technical audiences.
-
Work with key stakeholders to implement remediation plans in response to incidents.
-
Effectively investigative and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership.
-
Strong problem-solving abilities with an analytic and qualitative mindset.
-
Effectively communicate with customer leadership and disseminate timely updates of critical incidents with emphasis on attention to detail and accurate reporting.
Basic Qualifications:
-
Bachelor’s degree in computer science, engineering, Information Technology (IT), Cyber Security, or related field and 2, 4 or 8 years of professional experience (depending on level). Additional years of experience are accepted in lieu of degree.
-
5 years of professional experience (or a Bachelors’ Degree and 3 years of professional experience) in incident detection, response and remediation.
-
Minimum of three (3) but (5) preferred years of specialized experience in one or more of the following areas:
-
Email security
-
Digital media forensic
-
Monitoring and detection
-
Incident Response
-
Vulnerability assessment and penetration testing
-
Cyber intelligence analysis
-
Extensive experience analyzing and synthesizing information with other relevant data sources, providing guidance and mentorship to others in cyber threat analysis and operations.
-
Ability to collaborate with technical staff and customers to identify, assess, and resolve complex security problems/issues/risks and facilitate resolution and risk mitigation.
-
Ability to stay up to date with the latest threat intelligence, security trends, tools, and capabilities.
-
Possess strong problem-solving abilities with an analytic and qualitative eye for reasoning.
-
Ability to independently prioritize and complete multiple tasks with little to no supervision.
Preferred Qualifications:
-
Ability to coordinate and communicate well with team leads and government personnel.
-
Experience with detection engineering efforts to tune alerts, signatures, and tools to reduce false positives.
-
Experience in cyber government, and/or federal law enforcement
-
Experience with the Cyber Kill Chain and MITRE ATT&CK framework
-
Ability to formulate and create new processes, metrics, and procedures to improve security operations.
-
Must be able to report into the office as many as 5 days per week in Ashburn, VA
Required certifications:
The candidate should have at minimum ONE of the following certifications:
-
CompTIA Cyber Security Analyst (CySA+)
-
CEH – Certified Ethical Hacker
-
CompTIA Linux Network Professional (CLNP)
-
CompTIA Pentest+
-
CompTIA Cybersecurity Analyst (CySA+)
-
GPEN – Penetration Tester
-
GWAPT – Web Application Penetration Tester
-
GSNA – System and Network Auditor
-
GISF – Security Fundamentals
-
GXPN – Exploit Researcher and Advanced Penetration Tester
-
GWEB – Web Application Defender
-
GNFA – Network Forensic Analyst
-
GMON – Continuous Monitoring Certification
-
GCTI – Cyber Threat Intelligence
-
GOSI – Open Source Intelligence
-
OSCP (Certified Professional)
-
OSCE (Certified Expert)
-
OSWP (Wireless Professional)
-
OSEE (Exploitation Expert)
-
CCFP – Certified Cyber Forensics Professional
-
CISSP – Certified Information Systems Security
-
CHFI – Computer Hacking Forensic Investigator
-
LPT – Licensed Penetration Tester
-
CSA – EC Council Certified SOC Analyst (Previously ECSA – EC-Council Certified Security Analyst)
-
ENSA – EC-Council Network Security Administrator
-
ECIH – EC-Council Certified Incident Handler
-
ECSS – EC-Council Certified Security Specialist
-
ECES – EC-Council Certified Encryption Specialist
Clearance:
All Department of Homeland Security CBP SOC employees are required to favorably pass a 5-year (BI) Background Investigation
If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo — because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 — and moving faster than anyone else dares.
Original Posting:
March 4, 2026
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Pay Range:
Pay Range $87,100.00 - $157,450.00
The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
総閲覧数
0
応募クリック数
0
模擬応募者数
0
スクラップ
0
類似の求人

Consultant - Tech Consulting - FS - CNS - TC - Cyber Risk, Compliance & Resilience - Bangalore
EY ·

IT Platform Collaboration Administrator
eBay · Austin

Brokerage Specialist
Maersk · USA, Kansas, Emporia, 66801

Maintenance Planner and Scheduler
Curtiss-Wright · Client Site - USA - MA - Charlton - 53 Sturbridge Rd

Infrastructure Configuration Consultant
PNC Financial · Denver - 12345 W Colfax (CO147)
Leidosについて

Leidos
PublicLeidos Holdings, Inc. is an American defense, aviation, information technology, and biomedical research company headquartered in Reston, Virginia, that provides scientific, engineering, systems integration, and technical services.
10,001+
従業員数
Reston
本社所在地
$14.2B
企業価値
レビュー
3.7
9件のレビュー
ワークライフバランス
2.8
報酬
2.5
企業文化
3.8
キャリア
2.9
経営陣
3.2
68%
友人に勧める
良い点
Flexible work arrangements and hours
Supportive management and colleagues
Excellent health benefits
改善点
Limited career advancement opportunities
Poor work-life balance and high workload
Uncompetitive salary and pay
給与レンジ
27件のデータ
Junior/L3
Mid/L4
Senior/L5
Staff/L6
Director
Junior/L3 · Associate Substation Engineer
1件のレポート
$86,250
年収総額
基本給
$75,000
ストック
-
ボーナス
-
$86,250
$86,250
面接体験
4件の面接
難易度
3.5
/ 5
期間
14-28週間
内定率
25%
体験
ポジティブ 0%
普通 75%
ネガティブ 25%
面接プロセス
1
Application Review
2
Recruiter Screen
3
Hiring Manager Interview
4
Technical/Role-Specific Interview
5
Security Clearance Discussion
6
Offer
よくある質問
Technical Knowledge
Behavioral/STAR
Past Experience
Security Clearance Requirements
Government Contracting Experience
ニュース&話題
A Look At Leidos Holdings (LDOS) Valuation After Recent Mixed Share Price Performance - simplywall.st
simplywall.st
News
·
5d ago
Vanguard Group Inc. Reduces Stock Position in Leidos Holdings, Inc. $LDOS - MarketBeat
MarketBeat
News
·
5d ago
Leidos to support over 4.7 million service members and families through Military OneSource - Morningstar
Morningstar
News
·
5d ago
$456M Leidos deal keeps Military OneSource serving 4.7M people - Stock Titan
Stock Titan
News
·
5d ago