Raytheon Technologies Hardware & Software Asset Analyst – Tanium in Morrisville, North Carolina
This position is CONTINGENT upon funding, an open position, customer approval, completion of a favorable background investigation, and the ability to obtain & maintain a USPS sensitive clearance.
An experience Hardware & Software Asset Analyst – Tanium to join the security team of a major nationwide organization, with thousands of sites, to continually improve its complex multi-protocol nationwide network. The ideal candidate will have an understands how the Hardware / Software Asset Management program of a large enterprise should work is needed to support the team. The ideal candidate for this job will be an experienced information security practitioner who is goal-oriented and strives to exceed expectations
This position will be located on site in Raleigh, NC.
Job Responsibilities & required skills:
Must be eligible to obtain a sensitive clearance – Position of Public Trust – and may be required to obtain a higher security clearance.
Candidate will assess network threats such as computer viruses, exploits, and malicious attacks
Determine true threats, false positives and network system misconfigurations and provide solutions in a timely manner
Serve as a Subject Matter Expert in the analysis of tool outputs and providing recommendations for improving the overall security posture of the client
Conduct heavy analysis of asset data to aggregate multiple data inputs and put assets into context to identify vulnerabilities and potential gaps
Experience with endpoint management systems (e.g., Tanium, SCCM, BigFix, Symantec Endpoint
Strong Splunk experience in creating effective dashboards, hunting cyber threats using event correlation, and acting on machine intelligence to remediate vulnerabilities and risk to the enterprise
Netflow analytics for compliance and threat hunting
Work with suppliers of data (e.g., WonMug, Cisco ISE, StealthWatch) to maximize efficiency and accuracy of data feeds into Splunk. Advise suppliers of potential features in their tools that could be activated to improve security (e.g., TrustSec and Security Group Tagging in ISE)
Ability to map application components to identify security problems and provide solutions
Analyze data imports into Splunk for accuracy and completeness; compare data from the various network security tools to identify overlaps and search for gaps.
Conduct initial triage assessments of findings from network security tools
Engages with other internal and external forces to get and share information to improve processes and security posture
Troubleshoots application connectivity and performance through log analysis and network captures, etc.
Experience with Flexera/B|DNA, Splunk, BMC Atrium, ServiceNow, and enterprise network infrastructures
Experience with ForeScout CounterACT, Cisco ISE, MobileIron, and Tanium
Project planning experience
Excellent writing skills
Microsoft office suite of applications
Required Experience and Education:
Extensive experience (5+ years) in information security operations and/or related IT operational functions.
Bachelors Degree or higher in Computer Science, in an information technology discipline or a related technical discipline; or the equivalent combination of education, professional training or IT work experience.
Desired Certifications (one or more desired):
CISSP, C|EH, ISSEP, ISSMP, GCIH, GCFA, CISM, CCNA, CCNP, PMP 190792
Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.