The U.S. Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial i nternet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations. The CBP SOC is responsible for the overall security of CBP Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations. Leidos is seeking an experienced Insider Threat / Cyber Forensics SME to join our team. As a member of this highly technical Cyber Defense Forensics t eam supporting U.S. Customs and Border Protection (CBP), you will be responsible for in-depth cyber forensics , root cause analyses, insider threat investigations, management of insider threat tools and processes, spillage investigations, and ensure chain of custody during incident investigations in support of the protection of the customers’ systems, networks, and assets. Primary Responsibilities: The candidate shall provide support to CBP OIT’s Cyber Defense Forensic s (CDF) team in support of insider threat and security operations according to established policies, handbooks, and CBP CDF Standard Operating Procedures (SOPs). This support includes monitoring activities, conducting threat analysis, investigating policy violations, identifying mitigation and/or remediation courses of action, and assessing risk posed by trusted insiders. The main focus of this task is to work with the OIT tools to process incidents , investigate potential insider threats, spillages of multiple types of classified and/or controlled data, conduct root cause analyses into suspicious or malicious activity, and assist with SOC i ncidents / OPR investigations as needed . Conduct formal digital forensic investigations supporting insider threat investigations and document findings in formal , forensically sound investigation reports. Provide recommendations for Information Spillage Incident Response efforts on handling and sanitization methods pursuant to industry best practices, NIST 800-88 recommendations, and Federal guidelines. Conduct enterprise and system(s) endpoint analysis (e.g., Windows, Linux, Mac, Cloud , and mobile systems) and network based digital forensic analysis Perform e mail hygiene activities in support of CBP investigations . Support enterprise recovery efforts as necessary to ensure that security events and incidents are properly remediated prior to restitution. Utilize state of the art forensic tools (FTK/Encase, etc . ) to perform computer, mobile phone forensics and memory analysis (volatility, rekall ) in support of incident response . Conduct reverse engineering of suspicious files utilizing dynamic, automated and static analysis. Properly preserve evidence, maintain chain of custody and write malware analysis or forensic reports. Recognize attacker and APT activity, tactics, and procedures (TTPs) and I ndicators of C ompromise (IOCs) that can be used to improve monitoring, analysis, and incident response. Install, secure, maintain and recommend forensic software and hardware within a Forensic Lab environment while following established configuration management processes. Develop and build security content, scripts, tools, or methods to enhance forensic processes and insider threat investigations . Effectively investigate and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership. Develop and maintain Standard Operating Procedures (SOPs) and playbooks as deemed necessary.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Number of Employees
11-50 employees