Leidos hiring for HVA Technical Analyst jobs in Mount Rainier, MD, US
Description
The mission of the DHS Chief Information Security Officer Directorate (DHS CISOD) is to support the Department’s implementation of all applicable regulatory requirements including the Federal Information Security Modernization Act of 2014 (FISMA), relevant Office of Management and Budget (OMB) Circulars, Executive Orders, Federal laws, directives, policies, and regulations. The DHS CISOD’s mission is to also provide the Department of Homeland Security (DHS) a secure and trusted computing environment. The DHS CISOD assists in ensuring Department compliance with information security requirements. Information security is an essential business function, critical to enabling DHS to conduct its operations and deliver service to the public.
The DHS Cyber Security Support Service Program has a critical need for High-Value Assets (HVA) Analysts who will be part of the professional services team regarding federal information and cybersecurity doctrine, including FISMA, and the NIST issuances with a focus on High-Value Assets (HVA) and Cybersecurity Framework (CSF) in support of cybersecurity operations for the Department of Homeland Security. Essential Functions and Job Responsibilities include:
- Conduct system analysis and recommend cyber security controls.
- Provide lead support for assessments under auspice of the Federal Technical Lead.
- Provide support for the annual process for identifying, categorizing, and prioritizing HVAs.
- Support the continued development and maintenance of the HVA identification, categorization, and prioritization process as required.
- Review and revise existing processes and policies for maintenance and continuous program improvement.
- Research, develop, maintain, and update HVA documents, artifacts, and reports as required.
- Identify vulnerabilities and assist the HVA program office to implement timely remediation.
- Recommend an approach for prioritizing HVAs based on criticality and importance.
Minimum Qualifications:
- Bachelor's degree in information technology, computer science, information systems, or related field.
- Strong analytical and technical skills in computer network defense operations, ability to lead efforts in Incident Handling (Detection, Analysis, Triage), Hunting (anomalous pattern detection and content management) and Malware Analysis.
- Experience assessing and monitoring Privilege Access Management (PAM) and Identify Access Management (IAM) platforms.
- Prior experience and ability to with analyzing information technology security events to discern events that qualify as legitimate security incidents as opposed to non-incidents. This includes security event triage, incident investigation, implementing countermeasures, and conducting incident response.
- Previous hands-on experience with a Security Information and Event Monitoring (SIEM) platforms and/or log management systems that perform log collection, analysis, correlation, and alerting is required (preferably within Splunk).
- Strong logical/critical thinking abilities, especially analyzing security events from host and network event sources (e.g., windows event logs, AV, EDR, network traffic, IDS events for malicious intent).
- Strong proficiency Report writing – a technical writing sample and technical editing test will be required if the candidate has no prior published intelligence analysis reporting, excellent verbal and written communications skills and ability produce clear and thorough security incident reports and briefings.
- A working knowledge of the various operating systems and platforms (e.g., Windows, OS X, Linux, Solaris, RHEL, SunOS, IBM z/OS Mainframe etc.) commonly deployed in enterprise networks, a conceptual understanding of Windows Active Directory is also required, and a working knowledge of network communications and routing protocols (e.g. TCP, UDP, ICMP, BGP, MPLS, etc.) and common internet applications and standards (e.g. SMTP, DNS, DHCP, SQL, HTTP, HTTPS, etc.).
- Experience with the identification and implementation of countermeasures or mitigating controls for deployment and implementation in the enterprise network environment.
- Professional certification related to computer science or information assurance:
- Certified Information Systems Security Professional (CISSP)
- Certified Information Security Manager (CISM), Certified
- Information Systems Auditor (CISA), and/or CompTIA Security
Preferred Qualifications:
- Prior DHS IT security and/or audit experience preferred.
- Prior System Administrator experience a plus.
- Previous IT experience is preferred specifically 4 years of professional experience in a Computer Science discipline is ideal.
Original Posting Date:2024-01-30
While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Pay Range:Pay Range $101,400.00 - $183,300.00
The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Original Posting Date:01/30/2024
While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.