DCO Counter-Measures EngineerLeidos
Description
Leidos' Digital Modernization sector has a current job opportunity for a Defensive Cyber Operations (DCO) Counter-Measures Engineer.
This position will support the GSM-O II program, which provides network operations and cyber defense support to the Defense Information Systems Agency (DISA) in support of the DoD and COCOMs. The selected candidate will provide support for defensive cyber operations activities and will be expected to actively engage with a variety of customers and mission partners.
This position can be based out of any of our three core sites - Scott AFB, IL; Hill AFB, UT; or Columbus, OH. Partial/hybrid telework may be allowed, but a consistent on-site presence is required.
PRIMARY RESPONSIBILITIES:
- Author and deploy novel countermeasures to eliminate threats and illuminate their activities.
- Assess the effectiveness of countermeasures on an ongoing basis and revector actions as needed.
- Design and develop solutions to deliver automated cybersecurity services, conduct agile development & maintenance of automation script/tools to scale cybersecurity work across the enterprise.
- Develop custom integrations, data correlation, and processing strategies to reduce cybersecurity risk and act as a Subject Matter Expert for the automation team.
- Maintain situational awareness of cyber activity by reviewing DoD, Intelligence Community and open-source reporting for new vulnerabilities, malware or other threats that have the potential to impact the DoDIN.
BASIC QUALIFICATIONS:
- Must have an active DoD Secret clearance and be eligible to obtain TS/SCI
- Bachelor's degree in a related discipline with 8+ years of applicable experience; additional related years of experience is accepted in lieu of a degree.
- Requires 8140 Cyber Defense Infrastructure Support Specialist 521 (CS) Intermediate-level compliance, to include one of the following certifications: Security+, PenTest+, CySA+, GSEC, or GMON.
- Proficiency in programming in at least one modern language (Java, Python, Ruby, C++).
- Custom malware detection development experience.
- Advance understanding of TCP/IP, networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements.
- Understand the life cycle of network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs).
- UNIX Administrative skills.
PREFERRED SKILLS:
- Experience with DISA and DoD Networks.
- Experience countering APTs or emergent threats to DOD networks.
- Skilled in developing extended cyber security analytics.
- Experience in developing and supporting a development environment.
- Experience automating tasks via Bash, Python, PowerShell, or other scripting tools.
- Experience in Linux and Windows-based systems administration in a cloud or virtualized environment.
- Experience with API development and integration.
- Experience with Git, Sigma, Yara, Snort, and Suricata.
- Experience with Detection-as-a-Code Principles.
- Experience with malware analysis concepts and methods.
- Advanced Certifications such as GREM, OSCP, CISSP or CASP.
If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo — because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 — and moving faster than anyone else dares.
Original Posting:
May 12, 2026For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
