The U.S. Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations. The CBP SOC is responsible for the overall security of CBP Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations. Leidos is seeking an experienced Tier 2 Attack Sensing & Warning Analyst to join our team. As a member of the AS&W team supporting U.S. Customs and Border Protection (CBP), you will be responsible for leveraging advanced security technologies including EDR, SIEM, and network security tools to monitor, triage, and investigate endpoint and network activity, escalating alerts in accordance with established playbooks and procedures, analyzing logs and attacker behaviors to identify APT tactics, aggregating IOCs, and developing security content, scripts, and tools that enhance detection and incident response capabilities in support of the protection of the customers' systems, networks, and assets. Primary Responsibilities: Shift schedule: 7am-7pm, Sun-Tues, every other Wednesday. Utilize state of the art technologies such as Endpoint Detection & Response (EDR) tools, log analysis (Splunk) and occasionally network forensics (full packet capture solution) to investigative activity to examine endpoint and network-based data. Monitor alerting channels for multiple endpoint and network tools for alerts of various criticalities and escalate according to defined processes, procedures, and playbooks. Triage alerts to determine nature of activity occurring on customer networks, systems, servers, and mobile devices. Conduct log analysis from multiple avenues and tools to triage activity in support of incident response. Recognize attacker and APT activity, tactics, and procedures and aggregate indicators of compromise (IOCs) that can be used to improve monitoring, analysis and incident response. Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes. Lead Incident Response activities and mentor junior SOC staff. Create daily, weekly, and monthly reports for dissemination to customer leadership with emphasis on attention to detail and accurate capturing of relevant, timely data for briefings. Succinctly and accurately capture technical details and summarize findings for less technical audiences. Work with key stakeholders to implement remediation plans in response to incidents. Effectively investigative and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership. Strong problem-solving abilities with an analytic and qualitative mindset. Effectively communicate with customer leadership and disseminate timely updates of critical incidents with emphasis on attention to detail and accurate reporting.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Number of Employees
11-50 employees