Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Tier 2 Incident Response Analyst image - Rise Careers
Job details

Tier 2 Incident Response Analyst - job 1 of 3

DescriptionLeidos is seeking an experienced Incident Response Analyst to support this highly visible cyber security operations center (SOC) for Customs Border Protection (CBP), cyber analysis, application development, and a 24x7x365 support staff.Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations.  The CBP SOC is responsible for theoverall security of CBP Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations.Primary Responsibilities:• Shift schedule: 7m-7m, Thurs-Sat, every other Wednesday.• The ideal candidate will have a basic understanding of cyber threats, information security, and monitoring and detection. The candidate must be familiar with TCP/IP ports and protocols, intrusion detection systems, and netflow analysis.• - Security+ Certification or equivalent in industry certification, background and knowledge.• - Knowledge of TCP/UDP/IP networking, familiarity with packet analysis tools such as WireShark, and a general understanding of networking protocols similar to COMPTIA Network+Basic Qualifications:Bachelor's Degree and 2-4 years of experience be in the areas of incident detection and response, remediation malware analysis, or computer forensics.Prior relevant experience should be in the areas of incident detection and response, malware analysis, or computer forensics. Additional certs may be considered in place of a degree.Clearance: All CBP SOC employees are required to successfully complete a CBP Background Investigation to support this programPreferred Qualifications:• Experience in Federal Government, DOD or Law Enforcement in CND, IR or SOC role• Cyber Kill Chain Knowledge• Ability to script in one more of the following computer languages Python, Bash, Visual Basic or Powershell• One of the following certs: CCNA, CCNP, CCSP, CEH, CNDA, DCITA, ECES, ECSA, ECSP, ECSS, ENSA, GCIA, GCIH, GISF, GNFA, GPPA, GWEB, LPT, OSCP, OSEE, SEI, CCISOOriginal Posting Date:2024-07-30While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.Pay Range:Pay Range $65,000.00 - $117,500.00The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Leidos Glassdoor Company Review
3.8 Glassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon Glassdoor star icon
Leidos DE&I Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
CEO of Leidos
Leidos CEO photo
Tom Bell
Approve of CEO

Average salary estimate

Estimate provided by employer
$74544 / ANNUAL (est.)
min
max
$0K
$149K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Tier 2 Incident Response Analyst, Leidos

Leidos is on the hunt for a passionate Tier 2 Incident Response Analyst to join our dynamic team in Fairfax, VA, supporting the Customs Border Protection (CBP) Security Operations Center (SOC). This is an exciting opportunity to dive into the world of cybersecurity, where you'll play a key role in protecting critical information systems against evolving cyber threats. Working in our 24x7x365 SOC, you'll monitor for incidents, analyze potential threats, and respond swiftly to ensure the integrity of CBP networks. Your day-to-day might involve utilizing your knowledge of TCP/IP protocols and packet analysis tools, like Wireshark, while collaborating with a talented team focused on proactive cyber defense. We're looking for a candidate who has a basic understanding of incident detection, malware analysis, and forensic techniques. A Security+ certification or equivalent industry qualification is preferred, although additional relevant certificates can stand in for a degree. If you have experience in a Federal Government, DOD, or Law Enforcement context, that’s a plus! With a competitive pay range of $65,000 to $117,500, this role not only offers a chance to grow your skillset but also lets you make a significant impact on national security. If you’re eager to tackle the challenges of cyber threats head-on, we’d love to hear from you!

Frequently Asked Questions (FAQs) for Tier 2 Incident Response Analyst Role at Leidos
What are the primary responsibilities of a Tier 2 Incident Response Analyst at Leidos?

As a Tier 2 Incident Response Analyst at Leidos, your main responsibilities include monitoring CBP networks for potential security incidents, analyzing network traffic and alerts, and responding to threats quickly and effectively. You'll also engage in incident detection and remediation, conduct malware analysis, and contribute to forensic investigations when necessary. This role demands a solid understanding of cybersecurity concepts and tools to protect sensitive information systems.

Join Rise to see the full answer
What qualifications are required for a Tier 2 Incident Response Analyst role at Leidos?

To qualify for the Tier 2 Incident Response Analyst position at Leidos, candidates typically need a Bachelor’s degree and 2-4 years of experience in incident detection, remediation, or computer forensics. Familiarity with TCP/IP networking, packet analysis, and multiple cybersecurity certifications, including Security+ and others listed in the job description, enhance your chances of being a successful applicant.

Join Rise to see the full answer
What skills are essential for a successful Tier 2 Incident Response Analyst at Leidos?

Essential skills for a Tier 2 Incident Response Analyst at Leidos include a foundational understanding of cyber threats and incident response processes, as well as proficiency with monitoring and detection tools. Additional skills in networking protocols, experience with scripting languages (like Python or Bash), and familiarity with various cybersecurity certifications will greatly benefit those in this role.

Join Rise to see the full answer
What is the work schedule for a Tier 2 Incident Response Analyst at Leidos?

The work schedule for a Tier 2 Incident Response Analyst at Leidos consists of 12-hour shifts from 7 AM to 7 PM, typically working Thursday through Saturday along with every other Wednesday. This schedule is designed to ensure that our SOC maintains a 24x7x365 operational stance, providing ongoing support to the Customs Border Protection objective.

Join Rise to see the full answer
What kind of background check is required for a Tier 2 Incident Response Analyst at Leidos?

A background investigation is a requisite for all CBP SOC employees, including Tier 2 Incident Response Analysts at Leidos. This is essential to uphold the security and integrity required for those working within the Department of Homeland Security and ensure confidentiality in dealing with sensitive information.

Join Rise to see the full answer
Common Interview Questions for Tier 2 Incident Response Analyst
Can you explain your understanding of incident detection and response?

When asked about incident detection and response, outline your approach to identifying and managing security incidents. Discuss your experience with monitoring tools, how you analyze alerts, and your process for escalating threats. Be clear about how you prioritize issues based on severity and how you work with teams to resolve incidents.

Join Rise to see the full answer
What is your experience with TCP/IP networks and associated protocols?

In answering this question, detail your knowledge of TCP/IP networking, including how data is transmitted across networks. You can refer to any hands-on experience you have with setting up or analyzing networks, and mention specific tools or scenarios where you've monitored or interpreted TCP/IP traffic.

Join Rise to see the full answer
Describe your experience with malware analysis.

When discussing your experience with malware analysis, be prepared to share specific examples where you detected or analyzed malware events. Highlight any tools you've used and the methodologies you followed in combating those threats. A brief overview of an incident you successfully managed can provide insight into your capabilities.

Join Rise to see the full answer
How do you stay updated with the latest cybersecurity trends and threats?

When asked about staying current in cybersecurity, mention resources you rely on, such as industry blogs, journals, webinars, or cybersecurity training platforms. Talk about how you incorporate ongoing learning into your routine to keep your skills sharp and awareness high regarding evolving threats.

Join Rise to see the full answer
What certification do you have relevant to this role?

In your response, outline any certifications you hold that are pertinent to the Tier 2 Incident Response Analyst position. Discuss the knowledge and skills you've gained from these certifications and how they apply to your role. Highlight the importance of continuous education in the cybersecurity field.

Join Rise to see the full answer
Can you discuss your familiarity with packet analysis tools?

When discussing packet analysis tools, refer to your direct experience with software like Wireshark and how you’ve utilized it in past roles. Mention the types of analyses you conducted, such as inspecting traffic for anomalies and determining malicious activity in the packets.

Join Rise to see the full answer
How do you prioritize multiple security incidents?

To answer this, explain your strategy for prioritizing incidents based on severity, potential impact, and likelihood of occurrence. Emphasize your ability to remain composed under pressure and how communication with your team plays a vital role in effective incident management.

Join Rise to see the full answer
What scripting languages are you familiar with?

When responding, list any programming or scripting languages you are proficient in, such as Python, Bash, or PowerShell. Share how you’ve used these languages to automate tasks, analyze data, or create scripts that help in incident response processes.

Join Rise to see the full answer
What challenges have you faced in a cybersecurity operations role?

Identify specific challenges you've encountered in previous roles, such as dealing with sophisticated threats or managing high-stress situations during incidents. Discuss the lessons you learned and how you turned those challenges into growth opportunities or improved processes.

Join Rise to see the full answer
How do you document your incident response actions?

In your answer, highlight the importance of thorough documentation in incident response. Discuss the tools you use for documentation, your methodology for keeping track of incidents, and how detailed records can support future incident investigations and improve response efforts.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Leidos Hybrid Joint Base Pearl Harbor-Hickam, Hawaii
Posted yesterday
Accora Remote No location specified
Posted 8 days ago
Wyetech Hybrid Annapolis Junction, Maryland
Posted 12 days ago
Photo of the Rise User
Posted 11 days ago
Photo of the Rise User
Inclusive & Diverse
Rise from Within
Mission Driven
Diversity of Opinions
Work/Life Harmony
Transparent & Candid
Growth & Learning
Fast-Paced
Collaboration over Competition
Take Risks
Friends Outside of Work
Passion for Exploration
Customer-Centric
Reward & Recognition
Feedback Forward
Rapid Growth
Medical Insurance
Paid Time-Off
Maternity Leave
Mental Health Resources
Equity
Paternity Leave
Fully Distributed
Flex-Friendly
Some Meals Provided
Snacks
Social Gatherings
Pet Friendly
Company Retreats
Dental Insurance
Life insurance
Health Savings Account (HSA)

Everything we do is built on a commitment to do the right thing for our customers, our people, and our community. Our Mission, Vision, and Values guide the way we do business. At Leidos, our mission is to make the world safer, healthier, and mor...

392 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
December 19, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!