×
Register Here to Apply for Jobs or Post Jobs. X

Attack Sensing & Warning Analyst; T2 AS&W Analyst Security Clearance

Job in Ashburn, Loudoun County, Virginia, 20147, USA
Listing for: Leidos
Full Time position
Listed on 2026-01-15
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Job Description & How to Apply Below
Position: Attack Sensing & Warning Analyst (T2 AS&W Analyst) with Security Clearance
R
- Description The U.S. Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations. 

The CBP SOC   is responsible for   the   overall security of CBP Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations.
Leidos is seeking an experienced Tier 2 Attack Sensing & Warning Analyst to join our team. As a member of the AS&W team supporting U.S. Customs and Border Protection (CBP), you will be responsible for   l everaging advanced security technologies including EDR, SIEM, and network security tools to monitor, triage, and investigate endpoint and network activity, escalating alerts in accordance with established playbooks and procedures, analyz ing   logs and attacker behaviors to identify APT tactics, aggregat ing   IOCs, and develop ing   security content, scripts, and tools that enhance detection and incident response capabilities   in support of the protection of the customers’ systems, networks, and assets.

Primary Responsibilities:

Shift schedule: 7 a m-7 p m,   Sun - Tues , every other Wednesday.

* Utilize   state of the art   technologies such as Endpoint Detection & Response   (EDR)   tools, log analysis (Splunk) and   occasionally   network forensics (full packet capture solution) to   investigative activity to examine endpoint and network-based data.

* Monitor alerting channels for multiple endpoint and network tools for alerts of various criticalities and escalate according to defined processes, procedures, and playbooks.

* Triage alerts to   determine   nature of activity occurring on customer networks, systems, servers, and mobile devices.

* Conduct log analysis   from multiple avenues and tools to   triage   activity   in support of incident response.

* Recognize attacker and APT activity, tactics, and procedures a nd aggregate   indicators of compromise (IOCs) that can be used to improve monitoring,   analysis   and incident response.

* Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes.

* Lead   I ncident Response activities and mentor junior SOC staff.

* Create daily, weekly, and monthly reports for dissemination to customer leadership with emphasis on attention to detail and   accurate   capturing of relevant,   timely   data for briefings.

* S uccinctly and accurately capture technical details and summarize findings for less technical audiences.

* Work with key stakeholders to implement remediation plans in response to incidents.

* Effectively investigative and   identify   root cause findings then communicate findings to stakeholders including technical staff, and leadership.

* Strong problem-solving abilities with an analytic and qualitative mindset.

* Effectively communicate with customer leadership and   disseminate   timely   updates of critical incidents with emphasis on attention to detail and   accurate   reporting.

Basic Qualifications:

* Bachelor’s degree in computer science,   e ngineering, Information Technology   (IT) , Cyber Security, or related field and 4 years of professional experience. Additional years of experience are accepted in lieu of degree.
* 5   years of professional experience   (or a Bachelors’ Degree and 3 years of professional experience)   in incident detection,   response   and remediation .

* Minimum of three (3) but (5) preferred years of specialized experience in one or more of the following areas:

* Email security   
* Digital media forensic   
* Monitoring and detection   
* Incident Response   
* Vulnerability assessment and   penetration testing    
* Cyber intelligence analysis    
* Extensive experience analyzing and synthesizing information with other relevant data sources,…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary