SonicJobs Logo
Left arrow iconBack to search

Cyber Detection Engineer

Leidos
Posted 3 months ago, valid for 16 days
Location

Ashburn, VA 20149, US

Salary

$90,000 - $108,000 per year

info
Contract type

Full Time

By applying, a Sonicjobs account will be created for you. Sonicjobs's Privacy Policy and Terms & Conditions will apply.

SonicJobs' Terms & Conditions and Privacy Policy also apply.

Sonic Summary

info
  • The U.S. Department of Homeland Security (DHS) is seeking a Cyber Detection Engineer for its Customs and Border Protection (CBP) Security Operations Center (SOC).
  • Candidates must have a Bachelor's degree in a relevant field and at least 8 years of professional experience in incident detection and response, malware analysis, or cyber threat hunting.
  • The position offers a salary range of $107,900 to $195,050, depending on experience and qualifications.
  • Key responsibilities include developing security content, conducting threat analysis, and improving the overall security posture of CBP networks.
  • Applicants should have recent experience with security monitoring and scripting, as well as relevant cybersecurity certifications.

The U.S. Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations.  The CBP SOC is responsible for theoverall security of CBP Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations.Ā 

Ā 

Leidos is seeking an experienced Cyber Detection Engineer to join our team. As a member of the highly technical Operations Enhancement team supportingU.S. Customs and Border Protection (CBP), you will be responsible for in-depth technical analysis of network and endpoint logs & activity, developing signatures, alerts, rules, etc., to improve the security posture of the environment, developing processes and procedures for new tools and technologies in support of the protection of the customers’ systems, networks, and assets.Ā Ā Ā Ā 

Ā 

Primary Responsibilities:Ā 

  • Create, develop, and maintain new security content as the result of hunt missions, penetration tests, tuning requests and others, to include signatures, alerts, rules, workflows, and automation.Ā 

  • Identify, track, and investigate high priority threat campaigns, malicious actors with the interest, capability and Tactics, Techniques, and Procedures (TTPs).Ā 

  • Coordinate with cross functional teams to improve threat detection, design security content, and improve overall security posture of the Enterprise.Ā Ā 

  • Proactively and iteratively search through systems and networks to detect advanced threats, and create content to monitor and alert on such activity/threats.Ā 

  • Utilize the MITRE ATT&CK framework to understand TTPs of adversaries, threat actors, APTs, and threats targeting the customer agency and organize threat hunts around ATT&CK techniques and sub-techniques.Ā Ā 

  • Responsible for maintaining a comprehensive understanding of the cyber threat landscape, including identifying and analyzing cyber threats actors and/or activities to enhance cybersecurity posture of the organization’s IT operating environment.Ā 

  • Will conduct cyber threat analysis, identifying mitigation and/or remediation courses of action; developing actionable intelligence used to protect organizational IT assets; and trending cyber threat metrics for leadership situational awareness.Ā Ā Ā 

  • Analyze host, network, and application logs in addition to malware and code.Ā 

  • Will be responsible for developing scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, C++, HTML, XML or other type most appropriate for the task.Ā Ā 

  • Produce high quality technical and non-technical products, briefings, whitepapers, etc., with minimal supervision and emphasis on effective/accurate reporting on product topics.Ā Ā 

  • Maintain the daily battle rhythm for the Detection EngineeringTeam with an emphasis on adherence to deadlines, attention to detail, and clear/concise communication with the customer and stakeholders.Ā 

Ā 

Ā Will be responsible for:Ā 

  • Developing, creating, and maintaining security content for deployment on tools and technologies across the enterprise environment.Ā Ā 

  • Identifying, tracking, and investigating high priority threat campaigns, malicious actors with the interest, capability and Tactics, Techniques, and Procedures (TTPs) to create security content, and tune alerts, signatures, and rules.Ā Ā 

  • Utilizing the MITRE ATT&CK Framework toĀ Ā 

  • Author technical and non-technical reports and briefings to ensure leadership awareness of findings and observations.Ā Ā 

  • Create daily, weekly, and monthly reports and metrics for products and briefings.Ā 

  • Process technical data from various sources and fuse the data with intelligence reporting to improve the security posture of the customer, as well as manage Threat Hunt tools.Ā Ā 

Ā 

Basic Qualifications:Ā 

Ā 

  • Must have a Bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or aĀ related field anda minimum of 8 years of professional experience in incident detection and response, malware analysis, cyber threat hunting, or cyber forensics.Ā Ā 

  • Have 2+ years recent experience with host-based and network-based security monitoring using cybersecurity capabilities.Ā Ā 

  • Must be experienced developing scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, C++, HTML, XML or other.Ā 

  • Established experience with incident response and SIEM tools, host-based logs, network-based logs, and regex.Ā Ā 

  • Ability to work independently with minimal direction; self-starter/self-motivated.Ā 

Ā 

Required certifications:Ā 

The candidate should have at minimum ONE of the following certifications:Ā 

  • CompTIA Cyber Security Analyst (CySA+)Ā 

  • CompTIA Linux Network Professional (CLNP)Ā 

  • CompTIA Pentest+Ā 

  • CompTIA Cybersecurity Analyst (CySA+)Ā 

  • GPEN – Penetration TesterĀ 

  • GWAPT – Web Application Penetration TesterĀ 

  • GSNA – System andNetwork AuditorĀ 

  • GISF – SecurityFundamentalsĀ 

  • GXPN – Exploit Researcher and Advanced PenetrationTesterĀ 

  • GWEB – Web Application DefenderĀ 

  • GNFA – Network ForensicAnalystĀ 

  • GMON – Continuous Monitoring CertificationĀ 

  • GCTI – Cyber Threat IntelligenceĀ 

  • GOSI – Open Source IntelligenceĀ 

  • OSCP (CertifiedProfessional)Ā 

  • OSCE (Certified Expert)Ā 

  • OSWP (WirelessProfessional)Ā 

  • OSEE (Exploitation Expert)Ā 

  • CCFP – Certified Cyber Forensics ProfessionalĀ 

  • CISSP – Certified Information SystemsSecurityĀ 

  • CEH – Certified EthicalHackerĀ 

  • CHFI – Computer Hacking Forensic InvestigatorĀ 

  • LPT – Licensed PenetrationTesterĀ 

  • CSA – EC Council Certified SOC Analyst (Previously ECSA – EC-Council Certified Security Analyst)Ā 

  • ENSA – EC-Council Network Security AdministratorĀ 

  • ECIH – EC-Council Certified Incident HandlerĀ 

  • ECSS – EC-Council Certified Security SpecialistĀ 

  • ECES – EC-Council Certified Encryption SpecialistĀ 

Ā 

Ā 

Preferred Qualifications:Ā Ā 

  • A minimum of 8 years of hands-on experience with experience in the last 2 years that includes host-based and network-based security monitoring using cybersecurity capabilities.Ā Ā 

  • Demonstrated experience planning, executing, and participating in threat hunt missions.Ā 

  • Previous DOD, IC or Law Enforcement Intelligence or Counterintelligence Training/ExperienceĀ 

  • Understanding of complex Enterprise networks to include routing, switching, firewalls, proxies, load balancers.Ā 

  • Working knowledge of common (HTTP, DNS, SMB, etc) networking protocolsĀ 

  • Familiarity with operation of both Windows and Linux based systems.Ā Ā 

  • Proficient with scripting languages such as Python or PowerShellĀ 

  • Familiarity with Splunk Search Processing Language (SPL) and/or Elastic Domain Specific Language (DSL)Ā 

Ā 

Clearance:Ā Ā 

  • All Department of Homeland Security CBP SOC employees are required to favorably pass a 5-year (BI) Background InvestigationĀ 

  • The candidate must currently possess a Top Secret Clearance with the ability to obtain a Top Secret/SCI Clearance

Come break things (in a good way). Then build them smarter.

We're the tech company everyone calls when things get weird. We don’t wear capes (they’re a safety hazard), but we do solve high-stakes problems with code, caffeine, and a healthy disregard for ā€œhow it’s always been done.ā€

Original Posting:

December 17, 2025

For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.

Pay Range:

Pay Range $107,900.00 - $195,050.00

The Leidos pay range for this job level is a general guideline onlyĀ and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.




Learn more about this Employer on their Career Site

Apply now in a few quick clicks

By applying, a Sonicjobs account will be created for you. Sonicjobs's Privacy Policy and Terms & Conditions will apply.

SonicJobs' Terms & Conditions and Privacy Policy also apply.