Leidos logo

Assessor Engineer Communications and Networking Protocols Specialist

LeidosSan Antonio, Texas

$72,150 - $130,425 / year

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.1

Reclaim your time by letting our AI handle the grunt work of job searching.

We continuously scan millions of openings to find your top matches.

pay-wall

Job Description

The Leidos Digital Modernization Sector is pro-actively preparing for the potential of an increase in staff needed to fulfill an important mission in support of the Sixteenth Air Force Cyber Forces. Specifically, we are seeking multiple candidates for future Assessor Engineer Communications and Networking Protocols Specialist positions that will be located at Lackland AFB San Antonio TX. 

Organization Summary 

Leidos provides direct support for the Air Force's cyberspace and information warfare capabilities. It enables cyber operations, cyber defense, intelligence, and information security to protect Air Force networks and global missions. As a trusted partner, Leidos aids the Air Force in rapidly converging capabilities, mitigating cyber threats, and generating mission-critical cybersecurity outcomes. 

Position Summary 

The Assessor Engineer provides advanced technical expertise in communications protocols, network architectures, cybersecurity defense, and vulnerability assessment for Air Force and Department of Defense systems. This role advises the Cybersecurity and Information Assurance (IA) team on protocol behaviors, emerging technologies, vulnerabilities, and countermeasures. The engineer performs research, evaluates network-based cyber threats, supports defensive cyber operations, and assists with the secure operation and maintenance of both classified and unclassified networks. 

This position directly supports cybersecurity assessments, continuous monitoring, and network security engineering that enhance the resiliency and mission effectiveness of NSIN systems and mission partners. Primary Duties & Responsibilities: 

  • Review incoming technical requirements and provide expert analysis on communications and networking protocols, including: 

  • Protocol behavior and vulnerabilities 

  • Emerging protocol advancements 

  • Secure applications and defensive measures 

  • Conduct in-depth research into networking technologies to enhance cybersecurity and communications capabilities. 

  • Advise Cybersecurity and IA teams on protocol-level weaknesses, exploitation methods, and mitigation strategies. 

  • Perform vulnerability analysis and recommend countermeasures for protocol- and network-based cyber threats. 

  • Conduct technical assessments to validate secure configurations of routers, switches, firewalls, and transport systems. 

  • Evaluate cyber incidents related to protocol misuse, anomalous traffic, or intrusions, and support remediation efforts. 

  • Develop technical recommendations to enhance network security posture and reduce mission risk. 

  • Support integration of cybersecurity requirements into network and system engineering solutions. 

  • Maintain technical documentation for configurations, changes, test results, and protocol-based risk assessments. 

Basic (Required) Qualifications:

  • Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or related discipline with 4-12+ years of experience.

  • (Experience may substitute for education depending on contract requirements.) 

  • Requires an Active Top Secret/SCI security clearance. 

  • 3–5+ years of hands-on experience in network engineering, cybersecurity analysis, or protocol-level research. 

  • Strong understanding of communications and networking protocols (TCP/IP, UDP, DNS, DHCP, TLS/SSL, BGP, OSPF, SNMP, VoIP, etc.). 

  • Experience supporting network defense and cybersecurity operations. 

  • Proficiency with network security tools (e.g., Wireshark, tcpdump, Nmap, ACAS, Nessus). 

  • Working knowledge of routing, switching, firewalls, and intrusion detection/prevention systems. 

  • Ability to analyze protocol vulnerabilities and recommend countermeasures. 

  • Strong documentation and analytical skills with the ability to interpret technical data and cyber threat intelligence. 

  • DoD 8570/8140 Baseline Certification: IAT-II (e.g., Security+, CCNA Security, GICSP, CySA+) or equivalent. 

Preferred Qualifications:

  • Experience in DoD/Air Force cybersecurity environments. 

  • Knowledge of RMF security controls related to networking and boundary defense. 

  • Hands-on experience with classified networks (SIPR, JWICS, or IL5/IL6 environments). 

  • Familiarity with Zero Trust architecture and DoD cybersecurity modernization efforts. 

  • Advanced certifications such as: CCNP/CCNP Security; CISSP; CEH; GSEC, GCIA, GNFA, GREM, or similar GIAC certifications. 

  • Understanding of modern network technologies (SDN, VXLAN, cloud networking, automation frameworks). 

If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo — because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 — and moving faster than anyone else dares.

Original Posting:

November 21, 2025

For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.

Pay Range:

Pay Range $72,150.00 - $130,425.00

The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

Automate your job search with Sonara.

Submit 10x as many applications with less effort than one manual application.

pay-wall