Security Operations Architect / Deputy Program Manager

Leidos

Today
Dept of Homeland Security
Unspecified
Unspecified
IT - Security
Ashburn, VA (On-Site/Office)

R-00158038

Description

The U.S. Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial i nternet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations.  The CBP SOC is responsible for the overall security of CBP Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations.  

 

Leidos is seeking an experienced Security Operations Architect / Deputy Program Manager to join our team. As a member of this highly technical contract team supporting U.S. Customs and Border Protection (CBP), you will be responsible for coordinating operations of tools, optimizing security operations efficiencies, maintaining situational awareness of security operations and incidents, leading crisis action teams & high priority incident response procedures , ensuring quality root cause analys i s documents , management of tools and processes, incidents and investigations, and ensur ing chain of custody during incident investigations in support of the protection of the customers’ systems, networks, and assets.      

 

Primary Responsibilities:  

The candidate shall provide support to CBP OIT’s Cybersecurity Directorate (CSD) in support of security operations, engineering, and security policy according to established policies, handbooks, and Standard Operating Procedures (SOPs). This support includes enhancing and maturing security operations by identifying new technologies for implementation, better utilizing tools that are currently deployed, and mature processes by facilitating Lessons Learned programs . The main focus of this task is to work with the OIT CSD teams to lead the design, implementation, and continuous improvement of cybersecurity operations. This role will serve as a strategic technical leader, collaborating across IT, security, and external teams to ensure robust detection, response, and recovery capabilities.  

 

  • Lead technical efforts during major incident investigations and post-incident reviews.  


  • Provide architectural leadership and guidance during incident response events, coordinating with internal and external teams to analyze threats, contain breaches, and ensure timely recovery.   


  • Architect and enhance cybersecurity operations platforms including SIEM, SOAR, EDR, NDR, T hreat I ntelligence Platforms (TIP), MDM, DLP, etc .  


  • Design and optimize processes, technologies, and procedures surrounding security monitoring, incident detection / response processes , forensic collection and analysis, cyber threat hunting processes and procedures, and more .  


  • Track expenditures throughout the program lifecycle, ensuring adherence to budgeted amounts and a nalyze burn rates and provide insights to prevent over- or under-spending.  


  • Assist the Program Manager in developing the overall program budget in alignment with project goals and organizational guidelines and e stablish baseline budgets and track planned vs. actual performance over time.  


  • Collaborate with SOC, Cyber T hreat I ntelligence, Digital Forensics, Cyber Threat Hunt, VAT/Penetration Testing Team, SIEM team, and engineering teams to ensure cohesive and scalable security operations to ensure the security operations architecture aligns with business objectives , compliance requirements, and organizational risk appetite.  


  • Define and maintain architecture standards for security event logging, telemetry collection, and alert correlation.  


  • Develop detection use cases and response playbooks, mapping to frameworks like MITRE ATT&CK, to proactively identify and respond to advanced threats and adversary T actics, T echniques, and P rocedures (TTPs).  


  • Define performance metrics and KPIs for security operations effectiveness, leveraging dashboards, reports, and threat modeling to measure detection coverage, false positives/negatives, incident response times, and analyst resources .  


  • Stay current with emerging threats, vulnerabilities, and industry trends to proactively enhance detection capabilities.  


  • Effectively investigate and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership.   


  • Assist the Program Manager with leading and oversee ing the cybersecurity program and initiatives from planning through execution, ensuring alignment with business goals and regulatory requirements.    


  • Assist the Program Manager with developing and manag ing program roadmaps, budgets, timelines, and resource plans, coordinating efforts across security, IT, risk, and business units.  


  • Serve as the primary liaison between cybersecurity teams and Program Leadership as well as executive stakeholders, effectively communicating program status, risks, and outcomes.  


  • Monitor and report on program performance, using KPIs and metrics to assess progress, drive accountability, and support continuous improvement.  


 

Basic Qualifications :  

  • SANS GCIH certification  


  • Requires BS degree and 10 or more years of direct relevant experience .   


  • A minimum of two years of direct experience as a Security Operations Center (SOC) Manager .   


  • A minimum of two years of direct experience as a Deputy Program Manager.   


  • Previous experience contributing to or leading incidents and threat investigations in support of DHS or Federal Agency SOC operations .   


  • D egree in computer science, IT, Information/Cyber Security field from an accredited college or university .   


  • Flexible and adaptable self-starter with strong relationship-building skills   


  • Effective communication skills with emphasis on attention to detail, ability to accurately capture and document technical remediation details, and ability to brief stakeholders on incident statuses, recovery and root causes.   


  • Strong problem-solving abilities with an analytic and qualitative eye for reasoning under pressure .    


  • Ability to independently prioritize and complete multiple tasks with little to no supervision.  


 

Preferred Qualifications:  

  • Experience performing computer forensics in Federal Government, DOD or Law Enforcement environments.  


  • Ability to script in one more of the following computer languages Python, Bash, Visual Basic or PowerShell .   


  • Knowledge of the Cyber Kill Chain and MITRE ATT&CK framework   


  • Advanced understanding of multiple Operating Systems, monitoring and detection techniques and methods, and Incident Response Lifecycle .   


  • Prior experience with CBP/DHS  


  • Between 2-3 years of experience in two or more of these specialized areas:  


  • Cyber Threat Intelligence   


  • Digital M edia F orensic s  


  • Incident Response  


 

Required certifications:  

The candidate should have at minimum ONE of the following certifications:  

 

  • GCIH – Certified Incident Handler   


  • GCFA – Certified Forensic Analyst   


  • GCFE – Certified Forensic Examiner   


  • GREM – Reverse Engineering Malware   


  • GISF – Security Fundamentals  


  • GXPN – Exploit Researcher and Advanced Penetration Tester  


  • GCTI – Cyber Threat Intelligence  


  • GOSI – Open Source Intelligence  


  • OSCP (Certified Professional)  


  • OSCE (Certified Expert)  


  • OSWP (Wireless Professional)  


  • OSEE (Exploitation Expert)  


  • CCFP – Certified Cyber Forensics Professional  


  • CISSP – Certified Information Systems Security  


  • CHFI – Computer Hacking Forensic Investigator  


  • LPT – Licensed Penetration Tester  


  • CSA – EC Council Certified SOC Analyst (Previously ECSA – EC-Council Certified Security Analyst)  


  • CTIA – EC-Council Certified Threat Intelligence Analyst 


Clearance: Candidates must have a current Top Secret clearance with SCI eligibility.

Original Posting: April 23, 2025
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.

Pay Range: Pay Range $126,100.00 - $227,950.00

The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
group id: SCNCAPI2

Introducing the Next Level of Leidos

Find Leidos on Social Media
Network Employers (31)
Recruiter
Technical Recruiter
Recruiter
Recruiter
Senior Recruiter ~Talent Acquisition
About Us
Leidos is a Fortune 500® technology, engineering, and science solutions and services leader working to solve the world’s toughest challenges in the defense, intelligence, civil, and health markets. The company’s 43,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $13.7 billion for the fiscal year ended December 31, 2021. For more information, visit www.Leidos.com.

Leidos Jobs


Job Category
IT - Security
Employer
Leidos