Leidos Inc
Overview
Leidos Digital Modernization Sector is seeking a
Tier 1 AS&W Analyst - Day Front
for a highly visible cyber security program supporting Customs and Border Protection (CBP) security operations center (SOC). The CBP SOC is responsible for preventing, identifying, containing and eradicating cyber threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including LAN/WAN, commercial Internet connection, public facing websites, wireless, mobile/cellular, various cloud environments, security devices, servers and workstations. The CBP SOC oversees the security of CBP Enterprise-wide information systems and collects, investigates, and reports suspected and confirmed security violations. The shift schedule is
7am-7pm, Sunday-Tuesday, every other Wednesday . This position is located at our customer site in
Ashburn, VA . U.S. Citizenship
and the ability to pass a 5-year (BI) Background Investigation is required to begin work on the program. Responsibilities
Conduct log analysis and triage in support of incident response.
Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) to improve monitoring, analysis and incident response.
Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes.
Work with key stakeholders to implement remediation plans in response to incidents.
Investigate and identify root cause findings and communicate findings to stakeholders including technical staff and leadership.
Demonstrate flexibility, adaptability, and strong relationship-building skills.
Apply strong problem-solving abilities with an analytic and qualitative approach.
Independently prioritize and complete multiple tasks with little to no supervision.
Capture technical details succinctly and accurately, and summarize findings for less technical audiences.
Required Qualifications
Bachelor's degree in Computer Science, Engineering, Information Technology, Cyber Security, or related field.
At least two years of professional experience in incident detection, response and remediation.
Minimum of one (1) but two (2) preferred years of specialized experience in one or more of the following areas: email security, digital media forensics, monitoring and detection, incident response, vulnerability assessment and pen testing; OR cyber intelligence analysis.
Extensive experience analyzing and synthesizing information with other data sources, providing guidance to others in cyber threat analysis and operations.
Evaluating, interpreting, and integrating information, and fusing computer network attack analyses with counterintelligence and law enforcement investigations.
Experience aggregating and creating daily, weekly and monthly reports with emphasis on communicating technical concepts to various audiences.
Certifications
These are required:
one of the following
certifications:
CompTIA Advanced Security Practitioner (CASP)
CASP
CompTIA Cloud+
CompTIA Network+
CompTIA Security+
CompTIA Linux+
CompTIA Cyber Security Analyst (CySA+)
CompTIA Linux Network Professional (CLNP)
CompTIA Pentest+
CompTIA A+
CompTIA Cybersecurity Analyst (CySA+)
CompTIA Server+
GSEC - Security Essentials
GCIH - Incident Handler
GCIA - Intrusion Analyst
GCFA - Forensic Analyst
GPEN - Penetration
GWAPT - Web Application Penetration Tester
GCFE - Forensic Examiner
CEH - Certified Ethical Hacker
CHFI - Computer Hacking Forensic Investigator
CSA - EC Council Certified SOC Analyst
ECIH - EC-Council Certified Incident Handler
CNDA - Certified Network Defense Architect
Preferred Qualifications
Ability to coordinate and communicate with team leads and government personnel
Provide weekly status reports and requested documentation
Experience in cyber government, and/or federal law enforcement
Experience with the Cyber Kill Chain and MITRE ATT&CK framework
At Leidos, we don\'t want someone who "fits the mold"—we want someone who melts it down and builds something better. This is a role for the restless, the over-caffeinated, the ones who ask, "what\'s next?" before the dust settles on "what\'s now." If you\'re already scheming step 20 while everyone else is still debating step 2... good. You\'ll fit right in. Original Posting:
September 5, 2025 For U.S. Positions:
While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above. Pay Range:
Pay Range $55,250.00 - $99,875.00 The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
#J-18808-Ljbffr
Leidos Digital Modernization Sector is seeking a
Tier 1 AS&W Analyst - Day Front
for a highly visible cyber security program supporting Customs and Border Protection (CBP) security operations center (SOC). The CBP SOC is responsible for preventing, identifying, containing and eradicating cyber threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including LAN/WAN, commercial Internet connection, public facing websites, wireless, mobile/cellular, various cloud environments, security devices, servers and workstations. The CBP SOC oversees the security of CBP Enterprise-wide information systems and collects, investigates, and reports suspected and confirmed security violations. The shift schedule is
7am-7pm, Sunday-Tuesday, every other Wednesday . This position is located at our customer site in
Ashburn, VA . U.S. Citizenship
and the ability to pass a 5-year (BI) Background Investigation is required to begin work on the program. Responsibilities
Conduct log analysis and triage in support of incident response.
Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) to improve monitoring, analysis and incident response.
Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes.
Work with key stakeholders to implement remediation plans in response to incidents.
Investigate and identify root cause findings and communicate findings to stakeholders including technical staff and leadership.
Demonstrate flexibility, adaptability, and strong relationship-building skills.
Apply strong problem-solving abilities with an analytic and qualitative approach.
Independently prioritize and complete multiple tasks with little to no supervision.
Capture technical details succinctly and accurately, and summarize findings for less technical audiences.
Required Qualifications
Bachelor's degree in Computer Science, Engineering, Information Technology, Cyber Security, or related field.
At least two years of professional experience in incident detection, response and remediation.
Minimum of one (1) but two (2) preferred years of specialized experience in one or more of the following areas: email security, digital media forensics, monitoring and detection, incident response, vulnerability assessment and pen testing; OR cyber intelligence analysis.
Extensive experience analyzing and synthesizing information with other data sources, providing guidance to others in cyber threat analysis and operations.
Evaluating, interpreting, and integrating information, and fusing computer network attack analyses with counterintelligence and law enforcement investigations.
Experience aggregating and creating daily, weekly and monthly reports with emphasis on communicating technical concepts to various audiences.
Certifications
These are required:
one of the following
certifications:
CompTIA Advanced Security Practitioner (CASP)
CASP
CompTIA Cloud+
CompTIA Network+
CompTIA Security+
CompTIA Linux+
CompTIA Cyber Security Analyst (CySA+)
CompTIA Linux Network Professional (CLNP)
CompTIA Pentest+
CompTIA A+
CompTIA Cybersecurity Analyst (CySA+)
CompTIA Server+
GSEC - Security Essentials
GCIH - Incident Handler
GCIA - Intrusion Analyst
GCFA - Forensic Analyst
GPEN - Penetration
GWAPT - Web Application Penetration Tester
GCFE - Forensic Examiner
CEH - Certified Ethical Hacker
CHFI - Computer Hacking Forensic Investigator
CSA - EC Council Certified SOC Analyst
ECIH - EC-Council Certified Incident Handler
CNDA - Certified Network Defense Architect
Preferred Qualifications
Ability to coordinate and communicate with team leads and government personnel
Provide weekly status reports and requested documentation
Experience in cyber government, and/or federal law enforcement
Experience with the Cyber Kill Chain and MITRE ATT&CK framework
At Leidos, we don\'t want someone who "fits the mold"—we want someone who melts it down and builds something better. This is a role for the restless, the over-caffeinated, the ones who ask, "what\'s next?" before the dust settles on "what\'s now." If you\'re already scheming step 20 while everyone else is still debating step 2... good. You\'ll fit right in. Original Posting:
September 5, 2025 For U.S. Positions:
While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above. Pay Range:
Pay Range $55,250.00 - $99,875.00 The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
#J-18808-Ljbffr