Posted:
12/12/2024, 3:15:18 AM
Location(s):
Ashburn, Virginia, United States ⋅ Virginia, United States
Experience Level(s):
Expert or higher ⋅ Senior
Field(s):
IT & Security
Leidos is seeking an experienced threat detection engineer to join our team on a highly visible cyber security single-award IDIQ vehicle. Duties include proactively searching for threats. Inspect traffic for anomalies and new malware patterns. Investigate and analyze logs. Develop custom content within the Splunk SIEM using advanced SPL language and data models) or other network security tools to detect threats and attacks against the department. SIEM Content Developers participate in briefings to provide expert guidance on new threats and will act as an escalation point for analysts. The analyst may also be required to author reports and/or interface with customers for ad-hoc requests. In addition, the threat detection engineer may be asked to participate in discussions to make recommendations on improving SOC visibility or process.
Primary Responsibilities
Capture use cases from subscribers or other team members and develop correlation rules
Utilize knowledge of latest threats and attack vectors to develop Splunk correlation rules for continuous monitoring
Develop, manage, and maintain Splunk data models
Review logs to determine if relevant data is present to accelerate against data models to work with existing use cases
Develop custom regex to create custom knowledge objects
Developing custom SPL using macros, lookups, etc., and network security signatures such as SNORT and YARA
Develop custom dashboards and reports for customer stakeholders
Train and mentor junior staff
Basic Qualifications:
Bachelor’s Degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field and 12+ years of experience or MS Degree and 10 years of experience In addition, at least eight (8) years of experience in incident detection and response, malware analysis, or cyber forensics
Extensive experience working with various security methodologies and processes
Advanced knowledge of TCP/IP protocols, experience configuring and implementing various technical security solutions, extensive experience providing analysis and trending of security log data from a large number of heterogeneous security devices
Expert knowledge in two or more of the following areas related to cybersecurity:
Vulnerability Assessment, Intrusion Prevention and Detection, Access Control and Authorization, Policy Enforcement, Application Security, Protocol Analysis, Firewall Management, Incident Response, Web-filtering, Advanced Threat Protection
Experience developing advanced correlation rules utilizing tstats and data models for cyber threat detection
Experienced with creating and maintaining Splunk knowledge objects
Experienced managing and maintaining Splunk data models
Experience creating regex for pattern matching
Experience implementing security methodologies and SOC processes
Preferred Qualifications
Experience with cloud (e.g. o365, Azure, AWS, etc) security monitoring and familiar with cloud threat landscape
Completed Splunk Advance Searching and Reporting training
Experience developing custom scripts using python
Splunk certifications
TS/SCI Clearance preferred
While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Website: https://www.leidos.com/
Headquarter Location: Reston, Virginia, United States
Employee Count: 10001+
Year Founded: 1969
IPO Status: Public
Industries: Computer ⋅ Government ⋅ Information Services ⋅ Information Technology ⋅ National Security ⋅ Software