SOC Analyst - Tier 1 (Weekends Morning) with Security Clearance Community, Social Services & Nonprofit - Las Vegas, NV at Geebo

SOC Analyst - Tier 1 (Weekends Morning) with Security Clearance

R-00116513 Description Looking for an opportunity to make an impact? Unleash your potential at Leidos , where we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customer's success.
We empower our teams, contribute to our communities, and operate sustainably.
Everything we do is built on a commitment to do the right thing for our customers, our people, and our community.
Our Mission, Vision, and Values guide the way we do business.
If this sounds like an environment where you can thrive, keep reading! Leidos is a FORTUNE 500 company bringing a mix of innovative technology and sector expertise to customers in the national security, engineering, and the health industries.
Leidos is seeking a SOC Analyst - Tier 1 for a position as part of a team supporting the National Nuclear Security Administration in Las Vegas, Nevada area.
This is an onsite position, no full-time telework allowed.
The SOC Analyst - Tier 1 will review threat data from various sources and perform cyber threat intelligence analysis, correlate actionable security events/campaigns from various sources, perform network traffic analysis using raw packet data, net flow, IDS, IPS, and custom sensor output as it pertains to the cyber security of communication networks.
Conducts analysis providing indicators for enterprise defensive measures.
Interfaces with external entities including law enforcement organizations, intelligence community organizations and other government agencies as required.
Your greatest work is ahead! The Mission Leidos Civil Group helps modernize infrastructure, systems, and security.
We are a trusted partner to both government and highly-regulated commercial customers looking for transformative solutions in mission IT, security, software, engineering, and operations.
We work with our customers including the FAA, DOE, NASA, National Science Foundation, Transportation Security Administration, Custom and Border Protection, airports, and electric utilities to make the world safer, healthier, and more efficient.
Our customers take on the toughest challenges out there, and at times need a helping hand from specialists in their fields.
We combine our scale as a Fortune 500 company with the deep technical knowledge of our core capabilities and the expertise of our talented and diverse workforce to deliver mission-centric innovations.
For each of these core capabilities, we have developed proven, repeatable processes that help us deliver agile, cost-effective solutions to foster a better world.
Are you ready to join a team dedicated to a mission? Begin your journey of a flourishing and meaningful career, share your resume with us today! The Challenge:
Conduct trending and correlation of various cyber intelligence sources for the purposes of indicator collection, shifts in TTPs, attribution and establishing countermeasures to increase cyber resiliency.
Work with peers to conduct host-based and network-based forensics related to the identification of advanced cyber threat activities, intrusion detection, incident response, malware analysis, and security content development (e.
g.
, signatures, rules etc.
); and cyber threat intelligence.
Provide support to the Security Operations Center during incident response and threat hunting activities that includes cyber threat analysis support, research, recommending relevant remediation and mitigation.
Develop and maintain new reports of Cyber Threat Intelligence analysis to peers, management, and customer teams for purposes of situational awareness and making threat intelligence actionable.
Provide support to the Security Operations Center during incident response and threat hunting activities that includes cyber threat analysis support, research, recommending relevant remediation and mitigation.
Work with peers to conduct trending and correlation of various cyber intelligence sources for the purposes of indicator collection, shifts in TTPs, attribution and establishing countermeasures to increase cyber resiliency.
Normal working hours are Saturday & Sunday, 7am to 7pm
Friday & Monday, 7am to 3pm, however actual hours may vary depending on mission requirements.
What Sets You Apart:
BA/BS degree and 2-4 years of prior relevant experience, add'l experience may be considered in lieu of degree.
GIAC Certified Incident Handler (or equivalent), Certified Ethical Hacker (or equivalent) and Security
are required.
Experience extrapolating indicators of compromise and relevant TTPs to apply them to new and existing cyber threat defense tools e.
g.
, applying updates to IPS/IDS tools and SIEM content views.
Experience reviewing IOCs and TTPs from classified sources and extrapolating them for consumption within an unclassified environment for direct implementation into cyber defense tools.
Experience and proficiency in developing and presenting, both verbally and in writing, highly technical information and presentations to non-technical audiences at all levels of the organization.
Audiences for this information include, but are not limited to, senior executives at NNSA and other agencies.
Experience collecting intelligence, analyzing seemingly unrelated intelligence, and extracting meaning or relevance from the data.
and creating relevant intelligence reports.
Strong written and verbal communication skills and must be capable of the understanding, documenting, and communicating technical issues in a non-technical manner Working knowledge of Microsoft Word, Project, PowerPoint, and Excel for the purpose of documentation and presentation of deliverables Understanding of MITRE Attack framework US Citizen Q or TS Clearance.
nnsanims Pay Range:
Pay Range $63,050.
00 - $97,000.
00 - $130,950.
00 The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary.
Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Recommended Skills Agile Methodology Certified Ethical Hacker Communication Computer Networks Computer Security Giac Certified Incident Handler Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.