Incident Response Deputy Team Lead
Listed on 2025-12-24
-
IT/Tech
Cybersecurity, Network Security, IT Consultant, Information Security
Description
The U.S. Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a unique federal program responsible for preventing, identifying, containing and eradicating cyber threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations.
The CBP SOC is responsible for the overall security of CBP Enterprise‑wide information systems, and collects, investigates, and reports any suspected and confirmed security violations.
Leidos is seeking an experienced Incident Response professional to join our team. As a leader of this highly visible cyber Security Operations Center (SOC) for U.S. Customs and Border Protection (CBP), you will manage day‑to‑day operations of the team, coordinate efforts of the team, lead by example and perform in-depth technical analysis of network and endpoint logs & activity, cyber incident analysis, escalating findings as deemed appropriate, and containment, remediation and root cause analysis in support of protecting the customers’ systems, networks, and assets.
Primary Responsibilities:- Assist the CIRT Team Lead with managing the team of CIRT analysts, Incident Response actions and priorities, technical analysis and root cause analyses, and interfacing with the customer.
- Partner with other task leads in support of customer initiatives and cyber incidents.
- Create dashboards for key metrics and processes and deliver technical presentations to various levels of customer leadership.
- Interface with senior DHS & CBP leaders and directors to help maintain and sustain critical systems supporting the CBP Security Operations Center.
- Utilize state‑of‑the‑art technologies such as host forensics tools (FTK/Encase), Endpoint Detection & Response tools, log analysis (Splunk) and network forensics (full packet capture solution) to perform hunt and investigative activity to examine endpoint and network‑based data.
- Conduct in‑depth analysis on host’s and network’s forensic analysis, log analysis, and triage in support of incident response.
- Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis, and incident response processes.
- Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes.
- Lead incident response activities and mentor junior SOC staff.
- Work with key stakeholders to implement remediation plans in response to incidents.
- Effectively investigate and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership.
- Flexible and adaptable self‑starter with strong relationship‑building skills.
- Stay up to date with the latest threat intelligence, security trends, tools and capabilities.
- Possess strong problem‑solving abilities with an analytic and qualitative eye for reasoning.
- Independently prioritize and complete multiple tasks with little to no supervision.
- Effectively communicate with customer leadership and disseminate timely updates of critical incidents with emphasis on attention to detail and accurate reporting.
- Bachelor’s degree in a science or engineering field, IT, or Cybersecurity related field.
- 5+ years of experience in incident detection and response, remediation, malware analysis, or computer forensics.
- Ability to prioritize and complete multiple tasks with little to no supervision.
- Experience organizing, directing, and managing contract operation support functions involving multiple, complex, and interrelated project tasks.
- Experience effectively communicating at senior levels within a customer organization.
- Advanced knowledge of the Incident Response Lifecycle and applicability to various types of incidents and situations.
- Ability to collaborate with technical staff and customers to identify, assess, and resolve complex security problems/issues/risks and facilitate resolution…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).