Description
The U.S. Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible for preventing, identifying, containing, and eradicating cyber threats to CBP networks through monitoring, intrusion detection, and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial internet connections, public-facing websites, wireless, mobile/cellular, various cloud environments, security devices, servers, and workstations. The CBP SOC is responsible for the overall security of CBP Enterprise-wide information systems and collects, investigates, and reports any suspected and confirmed security violations.
Primary Responsibilities:
- Conduct cyber threat analysis, identifying mitigation and/or remediation courses of action; developing actionable intelligence used to protect organizational IT assets; and trending cyber threat metrics for leadership situational awareness.
- Maintain a comprehensive understanding of the cyber threat landscape, including identifying and analyzing cyber threat actors and/or activities to enhance the cybersecurity posture of the organization’s IT operating environment.
- Identify, track, investigate, and write technical products for dissemination to stakeholders regarding high-priority threat campaigns, malicious actors, APTs, emerging threats, etc.
- Analyze and track the cyber threat landscape, including identifying and analyzing cyber threat actors, APT TTPs, and/or activities to enhance the cybersecurity posture of the organization’s IT operating environment.
- Provide support to the Security Operations Center during incident response and threat intelligence activities, including cyber threat analysis support, research, and recommending relevant remediation and mitigation.
- Develop scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, C++, HTML, XML, or other types most appropriate for the task.
- Conduct trending and correlation of various cyber intelligence sources for the purposes of indicator collection, shifts in TTPs, attribution, and establishing countermeasures to increase cyber resiliency.
Will be responsible for:
- Producing high-quality technical and non-technical products, briefings, whitepapers, etc., with minimal supervision and emphasis on effective/accurate reporting on product topics.
- Maintaining situational awareness of emerging threats, zero days, vulnerabilities, and other threats against customer systems, networks, and assets.
- Processing technical data from various sources and fusing the data with intelligence reporting to improve the security posture of the customer, as well as managing Threat Intelligence tools such as Analyst1.
Basic Qualifications:
- The candidate must currently possess a Top Secret Clearance Eligibility with the ability to obtain a TS/SCI. In addition to the clearance requirement, all CBP personnel must have a current or be able to favorably pass a 5-year background investigation (BI).
- BS in IT-related field or higher and 8-12 years’ experience in an information technology field with a minimum of 5 years of experience as a Tier II senior cybersecurity analyst performing intelligence analysis, collection management, and technical analysis. Additional years of experience and/or security certifications may be substituted in lieu of a degree.
- 5+ years of recent experience with host-based and network-based security monitoring solutions, including security content recommendation or development (host-based and network signatures).
- 2 years recent experience with host-based and network-based security monitoring using cybersecurity capabilities.
- Must be experienced in developing scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, C++, HTML, XML, or other.
- Ability to work independently with minimal direction; self-starter/self-motivated.
- Must be a US Citizen.
Required certifications:
The candidate should have at minimum ONE of the following certifications:
- Certified Information System Security Professional (CISSP).
- SANS - GCIA – Intrusion Analyst.
- SANS - GREM – Reverse Engineering Malware.
- SANS - GISF – Security Fundamentals.
- SANS - GXPN – Exploit Researcher and Advanced Penetration Tester.
- SANS - GMON – Continuous Monitoring Certification.
- OSCP (Certified Professional).
- OSCE (Certified Expert).
- OSWP (Wireless Professional).
- OSEE (Exploitation Expert).
- CCSP – Certified Cloud Security Professional.
- LPT – Licensed Penetration Tester.
- ECSA – EC-Council Certified Security Analyst.
- Cyber Analyst Course.
Preferred Qualifications:
- A minimum of five (5) years of hands-on experience with experience in the last two (2) years that includes host-based and network-based security monitoring using cybersecurity capabilities.
- Previous DOD, IC, or Law Enforcement Intelligence or Counter Intelligence Training/Experience.
- Knowledge of Structured Analytic Techniques.
- Degree in Applied Intelligence or Advanced Degree in Cyber Security or related field.
Clearance:
- All Department of Homeland Security CBP SOC employees are required to favorably pass a 5-year (BI) Background Investigation.
Original Posting:
March 13, 2025
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Pay Range:
The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.