Cyber Intelligence Analyst-Incident Response job – Leidos Cyber, Inc. – Roseland, NJ

Intelligence Analyst Jobs


About Leidos

Leidos is a global science and technology solutionsleader working to solve the world’s toughest challenges in the defense,intelligence, homeland security, civil, and health markets. The company’s33,000 employees support vital missions for government and commercialcustomers. Headquartered in Reston, Virginia, Leidos reported pro forma annualrevenues of approximately $10 billion for the fiscal year ended January 1, 2016after giving effect to the recently completed combination of Leidos withLockheed Martin’s Information Systems & Global Solutions business(IS&GS). For more information, visit

Position Summary:
Responsible for maintaining the integrity and security ofenterprise-wide cyber systems and networks. Support cyber security initiatives through both predictive and reactiveanalysis, articulating emerging trends to leadership and staff. Coordinate resources during enterpriseincident response efforts, driving incidents to timely and completeresolution. Employ advanced forensictools and techniques for attack reconstruction, including forensic analysis,volatile data collection and analysis. Review threat data from various sources and develop custom signatures orother custom detection capabilities. Correlate actionable security events from various sources and developunique automation and correlation techniques. Conduct malware analysis providing indicators for enterprise defensivemeasures. Interface with external entities including law enforcementorganizations, intelligence community organizations and other governmentagencies as required.

Specific Functions

Perform the following functions as individual assignmentsor as part of a team:

Maintain situational awareness of cyber activity byreviewing open source reporting for new vulnerabilities, malware, or otherthreats that have the potential to impact the organization.

Perform cyber threat intelligence analysis, correlateactionable security events, perform network traffic analysis using raw packetdata, net flow, IDS, IPS, and custom sensor output as it pertains to the cybersecurity of communication networks, and participate in the coordination ofresources during incident response efforts.

Coordinate resources during enterprise incident responseefforts, driving incidents to timely and complete resolution.

Perform analytic support focused on Cyberspace doctrine,policies, strategies, capabilities, and Cyberspace groups, individuals,organizations, tools, tactics, and procedures.

Employ advanced forensic tools and techniques for attackreconstruction, including forensic analysis and volatile data collection andanalysis.

Conduct malware analysis of attacker tools providingindicators for enterprise defensive measures.

Analyze reports to understand threat campaign(s)techniques, lateral movements and extract indicators of compromise (IOCs).

Recommend sound remediation and recovery strategies,suggest defensive policy enhancements and information technology procedures.

Interface with external entities including lawenforcement organizations, intelligence community organizations and othergovernment agencies as required.

Deliver status reports, briefings, recommendations, andfindings to management and executives as required.


Minimum Bachelor’s degree from an accredited institutionin Computer Science, Information Technology or a related discipline, orequivalent experience/combined education, with some relevant working experienceand specialized training that is commensurate with the assignment. Must have Information Security Certificationscommensurate with experience, i.e. CISSP, GCFA, GCIH, CHFI, SEC+.


Minimum 3 years Professional technical experience in theinformation security field.

Minimum 2 years’ experience working with securitytechnologies including Intrusion Detection & Prevention Systems (IDS/IPS),Firewalls & Log Analysis.

Minimum 2 years working with SIEM, Network BehaviorAnalysis tools, Antivirus, and Network Packet Analyzers.

Minimum 1 years’ experience working with DigitalForensics tools in an Enterprise environment.

Minimum 1 years conducting Cyber Incident Responseactivities in an Enterprise environment.

Advanced knowledge of the Incident Response lifecycle.

Advanced Knowledge of the TCP and IP protocol suite,security architecture, DNS and remote access security techniques and products.


Ability to work autonomously as well as contribute in ateam and professional environment.

Ability to effectively manage multiple, concurrentactivities, while understanding and managing priorities, dependencies and risk.

Strong communication (verbal and written) andinterpersonal skills.

Strong focus on customer service and outcome.

Proven ability to adapt and maintain a flexible approachto changing needs or priorities.

Strong reporting and analytical skills with attention todetail.

Strong problem-solving skill with the ability to resolvecomplex technical issues.

High level of initiative and self-motivation.

The company’s diverse employees support vital missionsfor government and commercial customers. Qualified women, minorities,individuals with disabilities and protected veterans are encouraged to apply.Leidos is an Equal Opportunity Employer.

= Intelligence Analyst Jobs