• Leidos
  • $65,735.00 -145,350.00/year*
  • Frankford , DE
  • Information Technology
  • Full-Time
  • 30349 Gum Rd



Description Job Requisition: Cyber Security Analyst

Job Description:

Are you interested in continuing your career in Europe in a mission focused environment? Leidos has established upcoming positions throughout the European theater supporting multiple customers for the Department of Defense. We are looking for experienced, innovative and motivated IT Specialists to support enablement of AFRICOM s mission objectives.

What You ll Get to Do:

Leidos has an excellent opportunity for an experienced, self-directed, Cyber Security Analyst. This position is in support of a Department of Defense (DoD) organization, US AFRICOM located OCONUS in Stuttgart, Germany. This position is required to travel OCONUS.

The successful candidate must be able to communicate clearly and succinctly both written and orally, and present products and ideas in a business-like manner. The candidate will be required to work in dynamic fast paced environments that require team interaction and coordination of efforts. The candidate must be experienced in interfacing with both client managers and system users.

The Cyber Security Analyst will provide technical expertise to support the Combatant Command (CCMD) cybersecurity program and its functions IAW current architectures which includes all hardware and software tools and sensors from perimeter to endpoint. Provides Information Security Controls and guidelines to nodes and network management systems. Maintains network/system access and password controls. Collates and analyzes audit trail data. Reviews security threats and determines/implements effective countermeasures IAW established policies/regulations/directives. Analyzes network or system changes/reconfigurations for security impacts (performs risk analysis/assessment). Test and evaluate software security patches and security related configuration changes for compatibility with the current baseline and resolve any conflicts prior to deployment. Monitor implemented security controls and report status. Perform periodic and on-demand scans for vulnerabilities and unauthorized software on all CCMD assets using provided tools and provide results for review. Maintain scanning results and develop vulnerability trend results. Compile information and support required cyber evaluations, inspections, assessments, and reporting tasks. Perform incident response actions including, but not limited to, system isolation, data gathering, evidence handling, and reporting. Develop recommendations for counter measures or process improvement based on lessons learned from security incidents. Audit logs and provide reports as required. Other duties as assigned.

Provide exceptional technical expertise to support the Combatant Command (CCMD) cybersecurity program and its functions IAW current architectures which includes all hardware and software tools and sensors from perimeter to endpoint. Provides Information Security Controls and guidelines to nodes and network management systems. Maintains network/system access and password controls. Collates and analyzes audit trail data. Reviews security threats and determines/implements effective countermeasures IAW established policies/regulations/directives. Analyzes network or system changes/reconfigurations for security impacts (performs risk analysis/assessment). Test and evaluate software security patches and security related configuration changes for compatibility with the current baseline and resolve any conflicts prior to deployment. Monitor implemented security controls and report status. Perform periodic and on-demand scans for vulnerabilities and unauthorized software on all CCMD assets using provided tools and provide results for review. Maintain scanning results and develop vulnerability trend results. Compile information and support required cyber evaluations, inspections, assessments, and reporting tasks. Perform incident response actions including, but not limited to, system isolation, data gathering, evidence handling, and reporting. Develop recommendations for counter measures or process improvement based on lessons learned from security incidents. Audit logs and provide reports as required. Other duties as assigned.

More About the Role:

The successful candidate must be able to communicate clearly and succinctly both written and orally, and present products and ideas in a business-like manner. The candidate will be required to work in dynamic fast paced environments that require team interaction and coordination of efforts. The candidate must be experienced in interfacing with both client managers and system users.

Operate tools and systems that are required to support the Command's cybersecurity program. Support to Blue Coat, Splunk, CyberArk, and BitLocker. Conduct Enterprise Logging. Report potential cybersecurity incidents, perform incident actions, and report status. Support HBSS services. Provide STIG Assessment. Support ACAS Scanning. Support command security assessments.

Assist in the enhancement of AFRICOM's Cyber Threat Capability.

Provide focused operations/threat analysis on known intrusion sets. Discovering, tracking, reporting, and fusing global network events of interest. Apply subject matter expertise in adversarial methodologies in the cyber domain, and participate in OPTs. Develop and deliver specific deliverables associated with this support that are identified by the Government to include but not limited to Weekly Reports, Cyber Tippers, Briefings, Network Analytical Reports, ad hoc, and SPOT reports.

Additionally, the Cyber Security Analyst will provide remote support and/or travel to customer sites as required.

You ll Bring These Qualifications:

  • Currently hold an adjudicated Top Secret/SCI Clearance and be able to maintain
  • BA/BS + 3 years recent specialized or AA/AS +5 years recent specialized or a major cert +7 years recent specialized or years of recent specialized experience
  • DOD 8570 IAM II compliance
  • CEH, CRISC, GSEC
  • Working knowledge of supporting Operating Systems: Windows Server 2 and Windows 10, VMWare vSphere, Solaris 10-11, Red Hat Enterprise Linux
  • Demonstrate expert knowledge in network access control, intrusion prevention and detection systems, firewalls, routers, incident response, information security methods, and risk management
  • In-depth experience with DoD IT security requirements
  • TESA eligibility


These Qualifications Would be Nice to Have:
  • ITIL v3 Foundation
  • Experience with Bluecoat, McAfee HBSS, Splunk, CyberArk and Bitlocker, ACAS
  • Automation using Microsoft PowerShell, VBScript, or batch files
  • Adaptable to changing circumstances and operational needs
  • Understanding of Department of Defense Military standards


CITS III

External Referral Eligible

External Referral Bonus: Eligible

Potential for Telework: No

Clearance Level Required: Top Secret/SCI

Travel: Yes, 10% of the time

Scheduled Weekly Hours: 40

Shift: Day

Requisition Category: Professional

Job Family: Cyber Security



2000


Defense
- provided by Dice
Associated topics: identity access management, iam, idm, information assurance, information security, security, security analyst, security engineer, threat, violation

* The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.


Launch your career - Upload your resume now!

Upload your resume

Loading some great jobs for you...