To our valued Leidos candidates:

Coronavirus is on everyone's mind with the effects being felt around the world. The markets are volatile, and we're all concerned for the health and safety of our families, friends, and colleagues. Please know that we're taking all necessary measures to safeguard our employees, customers and the communities in which we live, including following all recommended best practices around social distancing.

With that in mind, in an abundance of caution, we are canceling all face to face career events, such as job fairs and open house events. In the coming days and weeks, we will be hosting career events virtually, using our online chat tools so that we may continue our hiring practice safely and securely. You can find available virtual career events at https://career-events.leidos.com.

We are using telephone meetings and online chats via Brazen to conduct interviews and hiring discussions, and we are offering options for video interviews so that you can have a virtual face to face meeting with your potential new leader. We do not conduct interviews or extend offers via text or chat based social media, such as WhatsApp or MySpace.

Leidos will never ask you to provide payment-related information at any part of the employment application process, nor will Leidos ever advance money as part of the hiring process. And Leidos will communicate with you only through emails that are generated by Leidos.com automated system. If you receive an email purporting to be from Leidos that asks for payment-related information or any other personal information, please report the email to Chris Scalia, Leidos’ Senior Vice President of Talent Acquisition, at [email protected].

As a company, as a country, as a world, we have confronted challenging moments before. We are confident that, guided by our values and the strength of our community as well as the commitment we have to the important work we do each day, we will find our way through this time together. We will do this with the care and concern for one another and the common good that defines. Please keep those impacted by the virus in your thoughts.

Close Window
Join our talent network

Job #: R-00062510
Location: Whiteley, HAM
Category: Cyber Operations
Schedule (FT/PT): Full Time
Travel Required: Yes, 25% of the time
Shift: Day
Potential for Telework: No
Clearance Required: Other Clearance

Description

Job Description:

Leidos are a growing company delivering innovative technology and solutions focused on safeguarding critical capabilities and transformation in frontline services, our work in the United Kingdom includes addressing some of the most complex problems in defence, healthcare, government, safety and security, and transportation. 

The Leidos Cybersecurity Intelligence & Response Center is growing and currently recruiting an experienced, and motivated Senior Cyber Intelligence Analyst.

This is an opportunity to join a team of highly skilled and innovative network defenders, and the best group of individuals out there.  Leidos’ Cybersecurity Intelligence and Response Team (CSIRT) has an immediate opening for a motivated Senior Cyber Intelligence Analyst.

Leidos is an international company made up of over 40,000 employees that provides Defense, Intelligence and Health Products to our customers.  Our goal is to stay ahead of, and maintain a technical advantage over our adversaries using the latest technical advancements, including custom built cybersecurity capabilities.

As a key part of the team, your responsibilities will include threat hunting, and tactical analysis of ongoing attacks by criminal and nation state actors. You will perform and lead various levels of data analysis, incident response, investigative analysis, and research on existing and emerging cyber threats, particularly those directed against Leidos' global networks. You will be expected to "think like an adversary" and engage in threat hunting operations leveraging your understanding of the tactics, techniques and procedures employed by advanced threats combined with intelligence from multiple sources, and provide reporting and briefings to other teams and leadership in order to maintain appropriate levels of situational awareness.

In this position, you will have the ability to grow through training opportunities, conferences and collaboration with industry peers and adjacent parts of our business.  You will be challenged and provided a tremendous opportunity for growth in a highly collaborative and supportive environment.

PRIMARY RESPONSIBILITIES

  • Analyse network and host activity associated with both successful and unsuccessful intrusions by advanced attackers.
  • Perform network traffic analysis utilising raw packet data, net flow, IDS, and custom sensor output.
  • Support enterprise incident response efforts
  • Leverage understanding of tactics, techniques and procedures associated with advanced threats to create and add custom signatures that mitigate highly dynamic threats to the enterprise.
  • Employ advanced forensic tools and techniques for attack reconstruction and intelligence gathering.
  • Proactively research emerging cyber threats. Apply analytical understanding of attacker methodologies and tactics, system vulnerabilities, and key indicators of attacks and exploits.
  • Contribute to threat intelligence reports and briefings that provide situational awareness of cyber threats impacting the company's global network infrastructure, to every level of the organization.
  • Participate in threat hunt operations using known adversary tactics, techniques and procedures, as well as indicators of attack, in order to detect advanced threats to the enterprise.
  • Collaborate using information and knowledge sharing networks and professional relationships to achieve common goals.
  • Provide on-call support for incident response efforts outside of core hours, as needed.
  • Mentor junior and senior analysts technically and conceptually
  • Collect, create and disseminate threat intelligence
  • Lead groups of all sizes within the team for strategic efforts, including long-term projects and incident response
  • Drive advanced countermeasures through to completion
  • Innovate and deliver new types of countermeasures
  • Increase the outreach of the team internally and externally through shared intelligence and presentations

REQUIRED QUALIFICATIONS

  • Experience in conventional network\host-based intrusion analysis, digital forensics, or malware analysis
  • Experience performing "deep dive" analysis and correlation of log data from multiple sources including PCAP and forensic artefacts
  • Experience with incident response activities
  • Strong understanding of Operating Systems and Network Protocols
  • Capable and comfortable communicating actionable threat intelligence to both technical and executive-level stakeholders
  • Previous experience as Threat Researcher and/or Intelligence Analyst
  • Working knowledge of Computer Network Exploitation (CNE), Computer Network Attack (CNA) and Computer Network Defense (CND) tools and techniques

PREFERRED QUALIFICATIONS

  • Understanding of behaviour-based threat models, including ATT&CK, Cyber Kill Chain, Diamond Model, etc.
  • Proficiency with Microsoft Windows administrative tools and the Unix/Linux command line
  • Experience with Splunk (preferred) or other SIEM-type platform
  • Familiarity with common languages (like Perl and Python) to parse logs, automate processes, and integrate systems
  • Experience with dynamic malware analysis, and reverse engineering
  • Experience in cryptography or cryptanalysis
  • Ability to create, modify, and implement both Snort and YARA signatures
  • Published research papers at conferences or through other mediums (blogs, articles)
  • A deep understanding of advanced cyber threats targeting enterprises, along with the tools, tactics, and procedures used by those threats
  • Experience applying threat and data modelling, advanced data correlation, and statistical analysis to develop alerts, notable events, investigative dashboards, and metrics driven reports

WHAT DO WE DO FOR YOU?

We offer meaningful and engaging careers, a collaborative culture, and support for your career goals, all while nurturing a healthy work-life balance.

We provide an employment package that attracts, develops and retains only the best in talent. 

Our reward scheme includes:

  • Contributory Pension Scheme
  • Private Medical Insurance
  • 33 days Annual Leave (including public and privilege holidays)
  • Access to Flexible benefits (including life assurance, health schemes, and cycle to work scheme)

External Referral Bonus:

Ineligible

External Referral Bonus $:

Potential for Telework:

No

Clearance Level Required:

Other Clearance

Travel:

Yes, 25% of the time

Scheduled Weekly Hours:

37.5

Shift:

Day

Requisition Category:

Manager

Job Family:

Cyber Operations, Cyber Security

Pay Range:

   Save Job Saved

Talent Community

Join our Talent Community to create a profile, enabling a streamlined application process and to help our recruiters better understand your areas of expertise and interest.

Join our Talent Community