Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Cyber Fusion Analyst image - Rise Careers
Job details

Cyber Fusion Analyst

DescriptionGSM-O II provides network operations and cyber defense support to the Defense Information Systems Agency (DISA) in support of the DOD and COCOMs. In this role, you will provide support with cyber threat intelligence analysis, incident handling, triage of events, threat detection, trend analysis, metric development, vulnerability information dissemination and conduct network traffic analysis using raw packet data, netflow, IDS, IPS and custom sensor output as it pertains to the cyber security of communications networks.We support 24/7 operations and shift assignments are based on both preference and contract requirements, so we ask our team members to remain flexible to potential shift modifications to meet minimum staffing requirements.Primary Responsibilities:• Maintain situational awareness of cyber activity by reviewing DoD, Intelligence Community and open-source reporting for new threat actors, vulnerabilities, malware, or other threats that have the potential to impact the DoDIN.• Synthesize, summarize, consolidate, and share potentially malicious activities on the DoDIN with DISA and mission partner organizations by creating incident reports, wiki updates, collaboration/chat tippers and notifications, DoD incident handling database queries, metrics, and trend reports.• Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface.• Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized plans are developed.• Analyze and document malicious cyber actors TTPs, providing recommendations and alignment to vulnerabilities and applicability to the enterprise operational environment.• Discover adversary campaigns, anomalies and inconsistencies in sensor and system logs, SIEMs, and other data.• Identify, investigate, and rule out system compromises, with the capacity to provide written analytic summaries and attack life cycle visualizations.• Provide risk assessments and recommendations based on analysis of technologies, threats, intelligence, and vulnerabilities.• Offer recommendations to adjust enterprise or tactical countermeasures to for threats impacting the DODIN.• Collect analysis metrics and trending data, identify key trends, and provide situational awareness on these trends.Required Qualifications:• Active DoD TS/SCI Clearance• Bachelor’s Degree in related discipline and 4+ years of related experience. Additional experience may be accepted in lieu of degree. Current DoD 8570 IAT Level II Certification (e.g. Sec+ CE) or higher at time of start.• Current DoD 8570 CSSP Analyst Certification (e.g. CEH, CySA+) or ability to obtain one within 180 days of starting.• In-depth knowledge of network and application protocols, cyber vulnerabilities and exploitation techniques and cyber threat/adversary methodologies.• Proficiency with datasets, tools and protocols that support analysis (e.g. passive DNS, Virus Total, Recorded Future, TCP/IP, OSI, WHOIS, enumeration, threat indicators, malware analysis results, Wireshark, Splunk, Elastic etc.).• Experience with various open-source and commercial vendor portals, services and platforms that provide insight into how to identify and/or combat threats or vulnerabilities to the enterprise.• Proficiency working with various types of network data (e.g. netflow, PCAP, custom application logs)Preferred Qualifications:• Experience with the DISN and other DOD Networks.• Skilled in building extended cyber security analytics (Trends, Dashboards, etc.).• Demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership.• Experience in intelligence driven defense and/or Cyber Kill Chain methodology.• IAT Level III and IAM Level II+III Certifications• Experience with Splunk Query LanguageOriginal Posting Date:2024-12-18While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.Pay Range:Pay Range $85,150.00 - $153,925.00The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Leidos Glassdoor Company Review
3.8 Glassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon Glassdoor star icon
Leidos DE&I Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
CEO of Leidos
Leidos CEO photo
Tom Bell
Approve of CEO

Average salary estimate

Estimate provided by employer
$137155 / ANNUAL (est.)
min
max
$114K
$160K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Cyber Fusion Analyst, Leidos

If you're passionate about cyber security and want to make a difference in a dynamic environment, consider the exciting opportunity as a Cyber Fusion Analyst with Leidos at Joint Base Pearl Harbor-Hickam, Hawaii. In this role, you'll be at the forefront of network operations and cyber defense, providing critical support to the Defense Information Systems Agency (DISA) and working closely with the Department of Defense (DoD) and Combatant Commands (COCOMs). Your day-to-day will involve analyzing cyber threat intelligence, managing incidents, and providing insights on vulnerabilities and trends that impact our communications networks. You'll be diving deep into network traffic analysis and leveraging your skills with datasets and security tools like Wireshark and Splunk. We are looking for someone who can maintain situational awareness of cyber activities and produce detailed reports to inform our mission teams. Flexibility is key here as you may be required to adjust to varying shift assignments to meet operational needs. The ideal candidate will have at least a Bachelor’s degree in a related field, encompass a strong understanding of network protocols, and hold an active DoD TS/SCI clearance. Bring your knowledge of cyber vulnerabilities, incident handling, and adversary methodologies to the table, and become part of a team dedicated to safeguarding our nation's cyber infrastructure.

Frequently Asked Questions (FAQs) for Cyber Fusion Analyst Role at Leidos
What are the primary responsibilities of a Cyber Fusion Analyst at Leidos?

As a Cyber Fusion Analyst at Leidos, your primary responsibilities will include maintaining awareness of cyber activities impacting the DoD, synthesizing open-source and intelligence community reports, analyzing threats, and documenting incidents to provide actionable insights for mitigation strategies. You’ll also conduct network traffic analysis and support 24/7 operations, ensuring that the Department of Defense Information Network (DoDIN) remains secure.

Join Rise to see the full answer
What qualifications do I need to apply for the Cyber Fusion Analyst position at Leidos?

To apply for the Cyber Fusion Analyst position at Leidos, you should have an active DoD TS/SCI clearance, a Bachelor’s degree in a related discipline, and 4+ years of relevant experience. Additionally, a current DoD 8570 IAT Level II certification and a CSSP Analyst certification, or the ability to obtain one, are required. Familiarity with cyber vulnerabilities, network protocols, and a range of security tools is also essential.

Join Rise to see the full answer
What kind of work environment can I expect as a Cyber Fusion Analyst with Leidos?

Working as a Cyber Fusion Analyst with Leidos means being part of a collaborative team in a high-stakes environment. You'll engage in 24/7 operations, requiring flexibility with shift assignments to meet contract obligations. The position is stationed at Joint Base Pearl Harbor-Hickam, Hawaii, where you're not just a number but a vital part of an organization's mission to secure vital communications networks.

Join Rise to see the full answer
What are the preferred qualifications for a Cyber Fusion Analyst at Leidos?

Preferred qualifications for the Cyber Fusion Analyst position at Leidos include experience with the Defense Information System Network (DISN), proficiency in creating cybersecurity analytics like dashboards and trends, understanding of the Cyber Kill Chain methodology, and prior experience briefing senior leadership. Prior certifications such as IAT Level III and IAM Level II or III can enhance your application.

Join Rise to see the full answer
How does Leidos support ongoing professional development for Cyber Fusion Analysts?

At Leidos, professional development is a key focus, especially for Cyber Fusion Analysts. The company encourages employees to pursue additional certifications pertinent to cybersecurity and provides access to resources and training necessary to stay ahead in the field. This includes support for obtaining industry-standard certifications as well as opportunities for further education in related disciplines.

Join Rise to see the full answer
Common Interview Questions for Cyber Fusion Analyst
Can you describe your experience with cyber threat intelligence?

When answering this question, focus on specific instances where you identified threats, analyzed data, and used that intelligence to protect systems or networks. Highlight any relevant tools you've used and how your insights translated into actionable strategies for mitigation.

Join Rise to see the full answer
What’s your process for incident handling?

Outline a structured approach to incident handling, such as identification, analysis, containment, eradication, and recovery. Provide examples from your past experiences to emphasize your knowledge of each phase and how you've successfully managed incidents.

Join Rise to see the full answer
How do you keep up with the latest cybersecurity trends and threat actors?

Discuss various resources and practices you employ to stay informed about current cybersecurity trends, such as following industry blogs, attending webinars, participating in forums, and engaging with professional cybersecurity communities.

Join Rise to see the full answer
Describe a time when you discovered a significant vulnerability. What steps did you take?

Provide a detailed account of a specific vulnerability you found, including how you identified it, the analysis you performed, and the recommendations you made to mitigate the risks. Highlight the impact your actions had on the organization’s security posture.

Join Rise to see the full answer
What data analysis tools are you proficient in for cybersecurity analysis?

List the data analysis tools you are familiar with, such as Wireshark, Splunk, or Elastic, and give examples of how you've used these tools to analyze threats or bolster defenses in prior roles.

Join Rise to see the full answer
How do you approach synthesizing threat intelligence from multiple sources?

Explain your method for collating and analyzing intelligence from various sources. Emphasize the importance of contextualizing the data for actionable insights and the techniques you use to ensure information is meaningful and relevant.

Join Rise to see the full answer
Can you provide an example of a successful report you created on malicious activities?

Share the process you followed to create an effective report, including the structure, key findings, and how your insights influenced decision-making. Use this to demonstrate your analytical abilities and communication skills.

Join Rise to see the full answer
What measures do you take to ensure data integrity while analyzing network traffic?

Discuss specific protocols or procedures you follow to ensure data integrity during analysis, such as secure logging, using checksums, and maintaining access controls to sensitive information.

Join Rise to see the full answer
How would you educate team members about a newly discovered threat?

Describe a strategy for effectively communicating the risks and mitigation strategies of a newly discovered threat to non-technical team members, including the use of plain language, visuals, and training sessions to enhance understanding.

Join Rise to see the full answer
What do you believe is the most critical aspect of a Cyber Fusion Analyst's role?

Articulate your thoughts on the most critical aspect of this role, such as vigilance, proactive threat detection, or collaboration among teams. Back this up with examples of how these aspects contributed to successful outcomes in your experience.

Join Rise to see the full answer

Everything we do is built on a commitment to do the right thing for our customers, our people, and our community. Our Mission, Vision, and Values guide the way we do business. At Leidos, our mission is to make the world safer, healthier, and mor...

392 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
December 19, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!