SonicJobs Logo
Left arrow iconBack to search

Attack Sensing & Warning Analyst (T2 AS&W Analyst)

Leidos
Posted 24 days ago, valid for 22 days
Location

Ashburn, VA 20147, US

Salary

$80,000 - $96,000 per year

info
Contract type

Full Time

Wellness Program

By applying, a Leidos account will be created for you. Leidos's Privacy Policy will apply.

SonicJobs' Terms & Conditions and Privacy Policy also apply.

Sonic Summary

info
  • The U.S. Department of Homeland Security is seeking a Tier 2 Attack Sensing & Warning Analyst to join its Customs and Border Protection Security Operations Center.
  • Candidates should possess a Bachelor's degree in a relevant field and have at least 4 years of professional experience, with a preference for 5 years in specialized areas such as incident detection and response.
  • The position offers a salary range of $87,100 to $157,450, depending on experience and qualifications.
  • Primary responsibilities include monitoring and investigating cyber threats, conducting log analysis, and developing security content and tools to enhance incident response capabilities.
  • Candidates must also have at least one relevant cybersecurity certification and the ability to communicate effectively with both technical and non-technical stakeholders.

Description

The U.S. Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations.  The CBP SOCĀ is responsible forĀ theĀ overall security of CBP Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations.Ā 

Ā 

Leidos is seeking an experienced Tier 2 Attack Sensing & Warning Analyst to join our team. As a member of the AS&W team supporting U.S. Customs and Border Protection (CBP), you will be responsible forĀ leveraging advanced security technologies including EDR, SIEM, and network security tools to monitor, triage, and investigate endpoint and network activity, escalating alerts in accordance with established playbooks and procedures, analyzingĀ logs and attacker behaviors to identify APT tactics, aggregatingĀ IOCs, and developingĀ security content, scripts, and tools that enhance detection and incident response capabilitiesĀ in support of the protection of the customers’ systems, networks, and assets.Ā Ā Ā 

Ā 

Primary Responsibilities:Ā 

Shift schedule: 7am-7pm,Ā Sun-Tues, every other Wednesday.Ā 

  • UtilizeĀ state of the artĀ technologies such as Endpoint Detection & ResponseĀ (EDR)Ā tools, log analysis (Splunk) andĀ occasionallyĀ network forensics (full packet capture solution) toĀ investigative activity to examine endpoint and network-based data.Ā 

  • Monitor alerting channels for multiple endpoint and network tools for alerts of various criticalities and escalate according to defined processes, procedures, and playbooks.Ā Ā 

  • Triage alerts toĀ determineĀ nature of activity occurring on customer networks, systems, servers, and mobile devices.Ā Ā 

  • Conduct log analysisĀ from multiple avenues and tools toĀ triageĀ activityĀ in support of incident response.Ā 

  • Recognize attacker and APT activity, tactics, and procedures and aggregateĀ indicators of compromise (IOCs) that can be used to improve monitoring,Ā analysisĀ and incident response.Ā 

  • Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes.Ā 

  • LeadĀ Incident Response activities and mentor junior SOC staff.Ā 

  • Create daily, weekly, and monthly reports for dissemination to customer leadership with emphasis on attention to detail andĀ accurateĀ capturing of relevant,Ā timelyĀ data for briefings.Ā Ā 

  • Succinctly and accurately capture technical details and summarize findings for less technical audiences.Ā 

  • Work with key stakeholders to implement remediation plans in response to incidents.Ā 

  • Effectively investigative andĀ identifyĀ root cause findings then communicate findings to stakeholders including technical staff, and leadership.Ā 

  • Strong problem-solving abilities with an analytic and qualitative mindset.Ā 

  • Effectively communicate with customer leadership andĀ disseminateĀ timelyĀ updates of critical incidents with emphasis on attention to detail andĀ accurateĀ reporting.Ā Ā 

Ā 

Basic Qualifications:Ā 

  • Bachelor’s degree in computer science,Ā engineering, Information TechnologyĀ (IT), Cyber Security, or related field and 4 years of professional experience. Additional years of experience are accepted in lieu of degree.

  • 5Ā years of professional experienceĀ (or a Bachelors’ Degree and 3 years of professional experience)Ā in incident detection,Ā responseĀ and remediation.Ā 

  • Minimum of three (3) but (5) preferred years of specialized experience in one or more of the following areas:Ā 

  • Email securityĀ 

  • Digital media forensicĀ 

  • Monitoring and detectionĀ 

  • Incident ResponseĀ 

  • Vulnerability assessment andĀ penetration testingĀ Ā 

  • Cyber intelligence analysisĀ Ā 

  • Extensive experience analyzing and synthesizing information with other relevant data sources, providing guidance and mentorship to others in cyber threat analysis and operations.Ā Ā 

  • Ability to collaborate with technical staff and customers toĀ identify, assess, and resolve complex security problems/issues/risks andĀ facilitateĀ resolution and risk mitigation.Ā 

  • Ability to stayĀ up to date with the latest threat intelligence,Ā security trends, tools, and capabilities.Ā 

  • Possess strong problem-solving abilities with an analytic and qualitative eye for reasoning.Ā Ā 

  • Ability to independently prioritize and complete multiple tasks with little to no supervision.Ā 

Ā 

Preferred Qualifications:Ā Ā 

  • Ability to coordinate and communicate well with team leads and government personnel.Ā 

  • Experience with detection engineering efforts to tune alerts, signatures, and tools to reduce false positives.Ā Ā 

  • Experience in cyber government, and/or federal law enforcementĀ 

  • Experience withĀ theĀ Cyber Kill ChainĀ and MITRE ATT&CK frameworkĀ Ā 

  • Ability to formulate and create new processes, metrics, and procedures to improve security operations.Ā Ā Ā 

Ā 

Ā 

Required certifications:Ā 

The candidate should have at minimum ONE of the following certifications:Ā 

  • CompTIA Cyber Security Analyst (CySA+)Ā 

  • CEH – Certified EthicalĀ HackerĀ 

  • CompTIA Linux Network Professional (CLNP)Ā 

  • CompTIA Pentest+Ā 

  • CompTIA Cybersecurity Analyst (CySA+)Ā 

  • GPEN – PenetrationĀ TesterĀ 

  • GWAPT – Web Application Penetration TesterĀ 

  • GSNA – System andĀ Network AuditorĀ 

  • GISF – SecurityĀ FundamentalsĀ 

  • GXPN – Exploit Researcher and Advanced PenetrationĀ TesterĀ 

  • GWEB – Web ApplicationĀ DefenderĀ 

  • GNFA – Network ForensicĀ AnalystĀ 

  • GMON – Continuous Monitoring CertificationĀ 

  • GCTI – Cyber Threat IntelligenceĀ 

  • GOSI – Open SourceĀ IntelligenceĀ 

  • OSCP (CertifiedĀ Professional)Ā 

  • OSCE (Certified Expert)Ā 

  • OSWP (WirelessĀ Professional)Ā 

  • OSEE (Exploitation Expert)Ā 

  • CCFP – Certified Cyber Forensics ProfessionalĀ 

  • CISSP – Certified Information SystemsĀ SecurityĀ 

  • CHFI – Computer Hacking Forensic InvestigatorĀ 

  • LPT – Licensed PenetrationĀ TesterĀ 

  • CSA – EC Council Certified SOC Analyst (Previously ECSA – EC-Council Certified Security Analyst)Ā 

  • ENSA – EC-Council Network Security AdministratorĀ 

  • ECIH – EC-Council Certified Incident HandlerĀ 

  • ECSS – EC-Council Certified Security SpecialistĀ 

  • ECES – EC-Council Certified Encryption SpecialistĀ 

Ā 

Clearance:Ā Ā 

All Department of Homeland Security CBP SOC employeesĀ are required toĀ favorably pass a 5-year (BI) Background Investigation

At Leidos, we don’t want someone who "fits the mold"—we want someone who melts it down and builds something better. This is a role for the restless, the over-caffeinated, the ones who ask, ā€œwhat’s next?ā€ before the dust settles on ā€œwhat’s now.ā€

If you’re already scheming step 20 while everyone else is still debating step 2… good. You’ll fit right in.

Original Posting:

January 14, 2026

For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.

Pay Range:

Pay Range $87,100.00 - $157,450.00

The Leidos pay range for this job level is a general guideline onlyĀ and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

About Leidos

Leidos is an industry and technology leader serving government and commercial customers with smarter, more efficient digital and mission innovations. Headquartered in Reston, Virginia, with 47,000 global employees, Leidos reported annual revenues of approximately $16.7 billion for the fiscal year ended January 3, 2025. For more information, visit www.Leidos.com.

Pay and Benefits

Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available at www.leidos.com/careers/pay-benefits.

Securing Your Data

Beware of fake employment opportunities using Leidos’ name. Leidos will never ask you to provide payment-related information during any part of the employment application process (i.e., ask you for money), nor will Leidos ever advance money as part of the hiring process (i.e., send you a check or money order before doing any work). Further, Leidos will only communicate with you through emails that are generated by the Leidos.com automated system – never from free commercial services (e.g., Gmail, Yahoo, Hotmail) or via WhatsApp, Telegram, etc. If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at LeidosCareersFraud@leidos.com.

If you believe you are the victim of a scam, contact your local law enforcement and report the incident to the U.S. Federal Trade Commission.

Commitment to Non-Discrimination

All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws.

Apply now in a few quick clicks

By applying, a Leidos account will be created for you. Leidos's Privacy Policy will apply.

SonicJobs' Terms & Conditions and Privacy Policy also apply.