To our valued Leidos candidates:

Coronavirus is on everyone's mind with the effects being felt around the world. The markets are volatile, and we're all concerned for the health and safety of our families, friends, and colleagues. Please know that we're taking all necessary measures to safeguard our employees, customers and the communities in which we live, including following all recommended best practices around social distancing.

With that in mind, in an abundance of caution, we are canceling all face to face career events, such as job fairs and open house events. In the coming days and weeks, we will be hosting career events virtually, using our online chat tools so that we may continue our hiring practice safely and securely. You can find available virtual career events at https://career-events.leidos.com.

We are using telephone meetings and online chats via Brazen to conduct interviews and hiring discussions, and we are offering options for video interviews so that you can have a virtual face to face meeting with your potential new leader. We do not conduct interviews or extend offers via text or chat based social media, such as WhatsApp or MySpace.

Leidos will never ask you to provide payment-related information at any part of the employment application process, nor will Leidos ever advance money as part of the hiring process. And Leidos will communicate with you only through emails that are generated by Leidos.com automated system. If you receive an email purporting to be from Leidos that asks for payment-related information or any other personal information, please report the email to Chris Scalia, Leidos’ Senior Vice President of Talent Acquisition, at [email protected].

As a company, as a country, as a world, we have confronted challenging moments before. We are confident that, guided by our values and the strength of our community as well as the commitment we have to the important work we do each day, we will find our way through this time together. We will do this with the care and concern for one another and the common good that defines. Please keep those impacted by the virus in your thoughts.

Close Window
Join our talent network

Job #: R-00072411-OTHLOC-PL-2D1040
Location: Glasgow, POST-LNK
Category: Cyber Operations
Schedule (FT/PT): Full Time
Travel Required: Yes, 25% of the time
Shift: 24/7 12 Hour Shift Pattern
Potential for Telework: Yes, 75%
Clearance Required: Other Clearance

Description

Job Description:

Cyber Intelligence Analyst

We are in search of an experienced Cyber Defence Analyst to join our task force. You will be based in one of three locations Glasgow, Farnborough or Coventry but will be expected to make visits on client site.

Due to continued expansion and new business wins, Leidos, a Global Solutions Provider specializing in large scale implementations involving science, engineering and technology, require a Cyber Intelligence Analyst.  The successful candidate will be able to demonstrate a minimum of 3-5 years’ experience from a Cyber Security Operations Centre (CSOC) background.  To succeed in the role the candidate must be capable of working under pressure, delivering on multiple client accounts and have an appetite to progress and develop their own career.  The Cyber Intelligence Analyst is required to work within a CSOC, adhering to a matrix managed environment and possess experience of leading and coordinating other CSOC Analysts who will escalate to them.  The Cyber Intelligence Analyst will be expected to significantly contribute to the growth and development of the CSOC.

You will be expected to collaborate with and support colleagues in the wider UK Information Assurance and Cyber Security Practice. You will collaborate with a wide variety of stakeholders outside of Information Assurance and Cyber Security within and without Leidos to ensure we detect and respond to Cyber Security Incidents for its customers.

Responsibilities

  • Take a lead to maintain the integrity and security of Cyber systems and networks.

  • Take the lead to support Cyber Security initiatives through both predictive and reactive analysis, articulating emerging trends to leadership and staff.

  • Lead the review of threat data from various sources and develops custom signatures or other custom detection capabilities.

  • Lead Cyber Threat intelligence analysis, correlates actionable security events/campaigns from various sources, and performs network traffic analysis using raw packet data, net flow, IDS, IPS, and custom sensor output as it pertains to the cyber security of communication networks.

  • Lead the development of unique automation and correlation techniques to better understand adversary Tactics, Techniques, and Procedures (TTPs).

  • Lead the analysis to provide indicators for enterprise defensive measures.

  • Lead the interface with external entities including law enforcement organizations, intelligence community organizations and other government agencies as required.

  • Uses data collected from cyber defence tools firewalls, IDS, network traffic, Security Orchestration and Automated Response (SOAR) etc. to analyse events that occur within the environments or based on the artefacts.

  • Employs network forensics techniques for attack reconstruction.

  • Respond to and correlate alerts from various detective and preventative Cyber Security tools such as Security Information Event Monitoring (SIEM), End Point Protection (EPP), End Point Detection and Response (EDR), Web Application Firewall (WAF) and Firewalls.

  • Proactively detect suspicious activity, vulnerabilities and security misconfigurations before they can be exploited by bad actors to impact Confidentiality, Integrity and Availability which could lead to a Cyber Security Incident.

  • Inspection and correlation of logs from multiple sources to identify repeating patterns and Indicators of Compromise (IOC).

  • Continuously scan the Threat Horizon to report and classify Threats according to impact which could potentially damage a client’s network or solution.

  • Engage with various security communities to review and share knowledge on IOC’s and Threats.

  • Follow and lead the development of the Cyber Security Incident Response Plan.

  • Follow and lead the development of the Cyber Security Incident Response Playbooks.

  • Apply and lead the development of the Cyber Security Incident Prioritisation Criteria to classify and rate Cyber Security Incidents.

  • Lead the coordination of countermeasures to mitigate Threats which can be used in action plans to respond to Cyber Security Incidents.

  • Ensure confidentiality and discretion is practiced when dealing with multiple clients to demonstrate professionalism and evidence their information is not shared with others.

  • Lead and develop the effective reporting of the operational status of all Cyber Security tools.

  • Lead and develop the effective reporting on the measurement of compliance with security updates and security patches and the production of MI for clients.

  • Where needed, lead a Team of Cyber Defence Analysts who collectively are responsible for making multiple daily CSOC checks to detect and respond to suspicious activity or alerts.

  • Part of a Team who may be required to work shifts in order to deliver a 24 x 7 CSOC capability to detect and respond to suspicious activity or alerts.

  • Lead and develop the concise and detailed recording of events of a Cyber Security Incident and of their own actions to deliver an effective handover during shift changes.

  • Lead the continuous improvement of CSOC processes and procedures.

  • Work closely with senior stakeholders from other Technology stacks to contribute to the Cyber Security Incident Response.

  • As part of a team lead table top scenarios and produce lessons learnt documents.

Technology and Process Experience

  • Exposure to working on or within HMG classified systems or programs is a bonus and not a must.

  • Already a CSOC Analyst or a Cyber Defence Analyst or a Cyber Intelligence Analyst with experience of investigating Cyber Security incidents and supporting root cause analysis or can demonstrate transferable skills and acumen to learn and excel at it.

  • Understanding of the Confidentiality, Integrity and Availability (CIA) triad.

  • Understanding of current trends for malware, ransomware, Advanced Persistent Threats affecting Cloud Platforms and On Premise solutions.

  • Proficient with the full suite of Microsoft Office products Word, Excel, Visio.

  • Experience of working with the disciplines of a Change Controlled environment.

  • Knowledge of Identification, Authentication, Authorisation, Auditing and Logging services.

  • An understanding of the OSI 7 network layers.

  • An understanding of the TCP/IP network layers.

  • Exposure to working with NCSC, NIST, and Centre for Internet Security (CIS) best practice.

  • An understanding of network and boundary protection controls for both Cloud and On Premise solutions including but not limited to Firewalls, Network Access Control Lists, Network Security Groups, DDoS Protection, VPN’s, Mail Gateways, Web Proxies, Load Balancers including Web Application Firewalls, Intrusion Prevention System and Intrusion Detection Systems.

  • Experience of using as many as possible of detective and preventative Cyber Security tools such as but not limited to Security Information Event Monitoring (SIEM), Security Orchestration and Automated Response (SOAR), End Point Protection (EPP), End Point Detection and Response (EDR), Web Application Firewall (WAF) and Firewalls

  • An understanding of the implementation of technologies such as but not limited to Hardware Security Modules (HSM), USB Controls, Encryption, SSL, TLS, and SSH.

  • Exposure to leading vendor products such as but not limited to Cisco Firewalls, Palo Alto Firewalls, SPLUNK, LogRhythm, Sophos End Point Protection, Nessus, Rapid 7, AWS Guard Duty, AWS Detective, AWS Inspector, Azure Security Centre, Azure Defender, Azure Office 365 Security and Compliance Centre

  • The ideal candidate will hold or be willing to gain CISSP, GMON, GCIH certification or equivalent and have an exposure to market leading public cloud technology.

Communication and Soft Skills

  • Excellent verbal and written communication skills required for hand overs, reports, MI and documenting events during a Cyber Security Incident.

  • Confidence, composure and leadership qualities.

  • Works well in a team environment, open to taking feedback in order to learn, able to cope with team dynamics with differing viewpoints and can also work with minimal supervision.

  • Ability to build strong relationships with customers and internal stakeholders.

  • Ability to logically analyse a problem and identify a plan to fix or remediate.

  • Ability to track market trends and suppliers to keep at the forefront of Cyber Security Technology.

  • Ability to manage multiple streams of work, prioritising, and escalating as necessary.

  • A self-starter who can see past obstacles driving a solution through to completion.

Candidates have the option of being located in either one of the three Leidos office Glasgow, Farnborough and Coventry.

What do we do for you?


At Leidos we are PASSIONATE about customer success, UNITED as a team and INSPIRED to make a difference. We offer meaningful and engaging careers, a collaborative culture, and support for your career goals, all while nurturing a healthy work-life balance.


We provide an employment package that attracts, develops and retains only the best in talent. Our reward scheme includes:


•    Contributory Pension Scheme
•    Private Medical Insurance
•    33 days Annual Leave (including public and privilege holidays)
•    Access to Flexible benefits (including life assurance, health schemes, childcare vouchers and cycle to work scheme)

•    Dynamic Working: https://www.leidos.com/sites/g/files/zoouby166/files/2019-11/PDF-Dynamic-Working-Leidos-UK.pdf

Commitment to Diversity:

We welcome applications from every part of the community and are committed to a truly diverse and inclusive culture.  We foster a sense of belonging, welcoming all perspectives and contributions, and providing equal access to opportunities and resources for everyone. 

If you have a disability or need any reasonable adjustments during the application and selection stages please let us know, and we will respond in a way that best fits your needs.

Pay Range:

#Remote

This job posting is no longer active.

Talent Community

Join our Talent Community to create a profile, enabling a streamlined application process and to help our recruiters better understand your areas of expertise and interest.

Join our Talent Community