Leidos Logo

Leidos

SOC Analyst

Posted 17 Days Ago
Remote
2 Locations
85K-154K Annually
Mid level
Remote
2 Locations
85K-154K Annually
Mid level
As a Tier 1 SOC Analyst, you will coordinate incident response efforts, analyze cyber incidents, manage security tools, and document processes in a dynamic cybersecurity environment.
The summary above was generated by AI

At Leidos, we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customers’ success. We empower our teams, contribute to our communities, and operate sustainable. Everything we do is built on a commitment to do the right thing for our customers, our people, and our community. Our Mission, Vision, and Values guide the way we do business.

If this sounds like the kind of environment where you can thrive, keep reading!

The Digital Modernization Sector brings together our digital transformation and IT programs, allowing us to better serve our customers through scale and repeatability. Leidos has a critical need for a Tier 1 SOC Analyst.

Leidos is seeking a motivated Tier 1 SOC analyst to join our team on a highly visible cyber security single-award IDIQ vehicle. This is a Federal Government program responsible for the prevention, identification, containment, and eradication of cyber threats to IT Enterprise through monitoring, intrusion detection and protective security services. This includes local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations. This Program is responsible for supporting the overall security of Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations. 

 

The SOC analyst-mid will perform the following: 

 

· Coordinate investigation and response efforts throughout the Incident Response lifecycle 

 

· Correlate and analyze events and data to determine scope of Cyber Incidents 

 

· Acquire and analyze endpoint and network artifacts, volatile memory, malicious files/binaries and scripts 

 

· Recognize attacker tactics, techniques, and procedures as potential indicators of compromise (IOCs) that can be used to improve monitoring, analysis and Incident Response. 

 

· Develop, document, and maintain Incident Response process, procedures, workflows, and playbooks 

 

· Tune and maintain security tools (EDR, IDS, SIEM, etc) to reduce false positives and improve SOC detection capabilities 

 

· Document Investigation and Incident Response actions taken in Case Management Systems and prepare formal Incident Reports 

 

· Create metrics and determine Key Performance Indicators to drive maturity of SOC operations 

 

· Develop security content such as scripts, signatures, and alerts 

Basic Qualifications: 

Bachelor’s degree in IT or related field and 4-8 years of experience with cybersecurity, soc analysis and/or incident response. Additional experience and certs may be considered in lieu of a degree.

4-8 years as a SOC analyst or similar work roles   

  •  In-depth knowledge of each phase of the Incident Response life cycle 
  •  Expertise of Operating Systems (Windows/Linux) operations and artifacts 
  •   Understanding of Enterprise Network Architectures to include routing/switching, common protocols (DHCP, DNS, HTTP, etc), and devices (Firewalls, Proxies, Load Balancers, VPN, etc) 
  •  Ability to recognize suspicious activity/events, common attacker TTPs, and perform logical analysis and research to determine root cause and scope of Incidents 
  •   Be familiar with Cyber Kill Chain and have utilized the ATT&CK Framework 
  •  Have scripting experience with Python, PowerShell, and/or Bash 
  •  Ability to independently prioritize and complete multiple tasks with little to no supervision 
  •   Flexible and adaptable self-starter with strong relationship-building skills 
  •  Strong problem-solving abilities with an analytic and qualitative eye for reasoning 

 

 Must have at least one of the following certifications: 

GCIH, GCFA, GCFE, GREM, GISF, GXPN, GWEB, GNFA, OSCP, OSCE, OSEE, CCFP, CISSP, CCNO, CEH, LPT, SCSA, ENSA, ECIH, ECSS, ECES, CIRC  

Original Posting Date:2024-12-12

While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.

Pay Range:Pay Range $85,150.00 - $153,925.00

The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

Top Skills

Att&Ck Framework
Bash
Cyber Kill Chain
Edr
Ids
Linux
Operating Systems
Powershell
Python
SIEM
Windows

Similar Jobs

6 Days Ago
Remote
Hybrid
USA
80K-130K Annually
Mid level
80K-130K Annually
Mid level
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
As a SOC Analyst, you will handle incidents, perform malware analysis, improve detection processes, and communicate findings effectively.
Top Skills: .NetCC#LinuxmacOSPerlPythonRuby On RailsVbWindows
9 Days Ago
Easy Apply
Remote
Hybrid
2 Locations
Easy Apply
Junior
Junior
Information Technology • Productivity • Professional Services • Software
The SOC Analyst will monitor security events, identify threats, perform incident analysis, and support security team processes within a managed services environment.
Top Skills: Cloud Native TechnologiesDatadogSplunkSumologic
10 Days Ago
Remote
USA
60K-80K
Senior level
60K-80K
Senior level
Fintech • Information Technology • Analytics
The Senior SOC Analyst leads advanced threat detection, performs incident management, mentors junior analysts, and optimizes detection processes.
Top Skills: AWSAzureElasticGCPPythonSentinelSigmaSplunkYara

What you need to know about the Charlotte Tech Scene

Ranked among the hottest tech cities in 2024 by CompTIA, Charlotte is quickly cementing its place as a major U.S. tech hub. Home to more than 90,000 tech workers, the city’s ecosystem is primed for continued growth, fueled by billions in annual funding from heavyweights like Microsoft and RevTech Labs, which has created thousands of fintech jobs and made the city a go-to for tech pros looking for their next big opportunity.

Key Facts About Charlotte Tech

  • Number of Tech Workers: 90,859; 6.5% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Lowe’s, Bank of America, TIAA, Microsoft, Honeywell
  • Key Industries: Fintech, artificial intelligence, cybersecurity, cloud computing, e-commerce
  • Funding Landscape: $3.1 billion in venture capital funding in 2024 (CED)
  • Notable Investors: Microsoft, Google, Falfurrias Management Partners, RevTech Labs Foundation
  • Research Centers and Universities: University of North Carolina at Charlotte, Northeastern University, North Carolina Research Campus

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account