Leidos is seeking a Senior Systems Engineer with leadership skills and the ability to work constructively and collaboratively across multiple functional and technical areas to achieve a positive impact on explicitly stated and implicit program goals and business results.
This position provides Tier II Cyber Infrastructure Support to C5ISR Center Defensive Cyber Solutions Branch (DCSB) Defensive Cyber Operations (DCO). Beyond advising and guiding technical matters, this position is tasked with driving implementation and adoption of new tools, research, capabilities, frameworks, and methodologies while ensuring those already in use are implemented, utilized properly, and improved.
A successful candidate should be a leader and problem solver with a proven ability to deliver superior results as part of a high performing team in a fast-paced environment.
Primary Responsibilities
Provide expert technical support for Linux based Intrusion Detection Systems (IDS) and other devices that impact network security monitoring.Lead systems engineering efforts in system development or enhancements, ensuring engineering and configuration management align with organizational standards.Design, install, and maintain network IDS systems, coordinating their use across diverse environments.Monitor and collaborate in a team-oriented, technical environment to maintain a strong, cohesive work atmosphere.Identify gaps in security capabilities and visibility, proposing and implementing effective solutions.Ensure Information Assurance Vulnerability Management (IAVM) compliance for all security-related devices.Drive the achievement of key objectives and deliverables in assigned projects or programs.Actively mentor junior engineering staff, promoting adherence to industry best practices.Coordinate with change and control boards, providing comprehensive documentation for infrastructure upgrades, lifecycle replacements, and new technology implementations.Manage SIEM user accounts, including the implementation of soft certificates and ensuring secure access.Develop and validate functional requirements with end-users, coordinating systematic enhancements with support teams.Promote and lead initiatives in automation and process optimization, driving research and implementation of efficiency improvements.Basic Qualifications
Bachelor’s degree with 8+ years of prior relevant experience or Master’s degree with 6+ years of prior relevant experience.Proficiency in Linux command-line interfaces and scripting in Python, Bash, PowerShell, or similar languages for daily tasks and configuration management.Experience in containerization, orchestration, and deployment using Docker in a Linux environmentStrong background in automation and configuration management using Ansible in Linux systemsIn-depth knowledge of computer security principles, DoD security protocols, and current and emerging cybersecurity technologies.Understanding of network topologies, including transport and IP, with the ability to interpret and create network topology and rack elevation diagrams.Familiarity with security policies, vulnerability management, and DoD 8570 IAT-II and CSSP-Infrastructure Support certifications (required prior to starting).Hands-on experience with change control processes and a track record of effective troubleshooting and analytical problem-solving.Excellent communication skills, capable of delivering technical information and creating detailed technical reports on findings.Must possess strong project, technical, interpersonal, and presentation skills.Available for on-call support as needed.Active TS/SCI clearance with SAP eligibility and U.S. citizenship required.Preferred Qualifications
Red Hat Enterprise Linux Certified Engineer (RHCE) certification.Proficiency with the ELK stack and Bro/Zeek for enhanced security monitoring and data analysis.In-depth knowledge of core cybersecurity technologies, along with awareness of emerging capabilities.Proven experience in researching and implementing new, innovative technologies.Strong understanding of the cybersecurity threat lifecycle, including attacks, attack vectors, exploitation methods, and intrusion tactics, techniques, and procedures (TTPs).Highly motivated self-starter with excellent written and verbal communication skills, capable of producing comprehensive technical reports and analytical findings.Original Posting Date:2024-11-01While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Pay Range:Pay Range $87,100.00 - $157,450.00The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.