Lead Cyber Network Defense Detection SME


Job Description:

Leidos is seeking a Lead Cyber Network Defense (CND) Detection Functional/Technical Consultant to join a team supporting a government customer in a highly complex cyber security environment. The successful candidate will manage a team ranging from 20-25 staff and work in a high-pressure environment, delivering outstanding results under tight deadlines and constraints. This role serves as a key co-leadership governance of the 24/7/365 SOC function for the customer.

The Lead CND Detection Functional/Technical consultant will serve as the principle technical advisor and subject matter expert for CND Detection services. They will be an expert for enterprise incident detection. The Lead Detection consultant shall be a multi-functional individual with strong leadership and technical skills including but not limited to the following core detection concepts and capabilities; instrumenting security event IT infrastructure and application telemetry to detect threat patterns and/or indicators of attack; optimize data/event collection protocols, processing and monitoring workflows; utilize technical security tools to detect and monitor existing or newly deployed vulnerability systems; coordinate and orchestrate proactive and predictive threat hunting operations. The consultant shall understand the incident detection process. The candidate shall be familiar with the utilization, configuration, and implementation of industry standard cyber defense capabilities including but not limited to web content filters, email security capabilities, IDS, IPS, HBSS, SIEM, DNS security practices, advanced log analysis, network monitoring, network flow analysis, packet capture analysis, network proxies, firewalls, anti-virus capabilities, Linux/UNIX command line, and access control lists.

Candidates must understand the lifecycle of the network threats, attack vectors and methods of exploitation. Candidates should understand the incident response process in accordance with Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510.01 and other applicable DoD/IC directives and policies. They must understand the incident response processes and procedures to aid in the facilitation of comprehensive procedures for collaboration and incident escalation from other DCNDC functional teams.

Primary Responsibilities

Lead and direct enterprise cyber security detection functions at both the technical, operational day-to-day, and incident response events including but not limited to the following objectives and functional areas;
  • Lead a team of cyber professionals responsible for instrumenting enterprise wide security threat event telemetry and pattern recognition
  • Integrate security telemetry from the enterprise service fabric into SOC SIEM analysis and hunting platforms and capabilities
  • Integrate threat detection mechanisms with defensive countermeasures to add resilience to cyber attacks
  • Implement a meta-data foundation and data analysis capability which detects and alerts on malicious security event patterns
  • Design, implement and support detection of threats based on entity(device) and user behavior variances
  • Model, test, validate threat detection alerts serving as the basis for security event triage and investigation by SOC Analysts
  • Collaborate across all major SOC, Vulnerability Assessment, Audit/Compliance, Countermeasure, Fusion and Incident Response functions
  • Collaborate with the cyber security architecture and engineering teams to optimize security telemetry to enable high fidelity detection capabilities
  • Provide support and advisement on tuning security logging infrastructure to optimize detection capabilities and support SOC alerting and triage response functions
  • integrating threat detection protocols and security event telemetry to optimize proactive detection and hunting of threat patterns present from the enterprise service fabric
  • integration of proactive cyber threat intelligence signals with detection and alerting functions
  • play a key role in modeling, testing, validating and converting relevant adversarial threat alerts to production SOC alerts

Basic Qualifications
  • Previous experience leading and managing a team of 5+ staff responsible for supporting, configuring, architecting enterprise wide security telemetry logging
  • Serve as the technical Subject Matter Expert (SME) in leading a team of staff in the design, implementation, integration and operational support of cyber security layers delivering detection capabilities
  • Knowledge and experience instrumenting, configuring and integrating security event meta-data with SIEM platforms
  • Knowledge and application of transforming adversarial Tactics, Techniques and Protocols (TTPs) into proactive detection events
  • Established technical knowledge of the inter-workings of various security layers; IDS, IPS, HBSS, SEIM, DNS, Active Directory security practices, advanced log analysis, network monitoring, network flow analysis, packet capture analysis, network proxies, firewalls, anti-virus capabilities
  • Demonstrated understanding of the life cycle of network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs)
  • Technical experience with security event formats and inter-platform API integration
  • Directs multiple contractor and subcontractors teams through to project completion
  • BA/BS or equivalent experience and 12 - 15 years of prior relevant experience

Security Clearance

  • TS/SCI clearance and polygraph is required to be considered.

  • US Citizenship is required due to the nature of the government contracts we support.

  • DoD 8570 compliance or information assurance certification commensurate with technical objectives and services required within the task order. Applicable software or hardware training and certifications commensurate with the technical objectives, services required, and IT environment specified within the task order

Preferred Qualifications:
  • In depth technical knowledge of security event meta-data structure, value and meaning when integrating detection functions into a SOC and SIEM
  • Experience designing, implementing and managing security event logging architectures and telemetry meta-data collection and analysis
  • Experience designing, implementing detection patterns and indicators of compromise aligned to TTPs and MITRE ATT&CK framework

External Referral Bonus:


External Referral Bonus $:


Potential for Telework:


Clearance Level Required:

Top Secret/SCI


Yes, 25% of the time

Scheduled Weekly Hours:




Requisition Category:


Job Family:

Cyber Operations

Pay Range: