Raytheon Veterans Jobs

Job Information

Raytheon Technologies Cyber Threat Hunter in Rosslyn, Virginia

Raytheon Intelligence & Space (RIS) – Cybersecurity, Training & Services (CTS) has an immediate opening for a cleared Cyber Threat Hunter to support a U.S. Federal Agency contract to enable mission accomplishment by identifying current and emerging threat trends, threat actors using a variety of cyber threat intelligence sources.

Provide technical assessments of cyber threat actor use of cyber vulnerabilities, exploits, payloads, access infrastructures, and mission platforms. Conduct all-source research on cyber threat actors and intrusion sets (e.g., APTs); evaluate both technical and Intel reporting for cyber threat activities of interest. Conduct detailed analysis of incidents, threats, vulnerabilities, tactics, techniques and procedures (TTP), and other malicious and non-malicious indicators.

Work Location: National Capital Region (Rosslyn, VA)

  • A TS security clearance is required

Job Description:

Perform assessments of systems and networks within the networking environment or enclave and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy. This is achieved through passive evaluations such as compliance audits and active evaluations such as vulnerability assessments. Establishes strict program control processes to ensure mitigation of risks and supports obtaining certification and accreditation of systems. Includes support of process, analysis, coordination, security certification test, security documentation, as well as investigations, software research, hardware introduction and release, emerging technology research inspections and periodic audits. Assist in the implementation of the required government policy (i.e., NISPOM, DCID 6-3), make recommendations on process tailoring, participate in and document process activities. Perform analyses to validate established security requirements and to recommend additional security requirements and safeguards. Support the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results and preparation of required reports. Document the results of Certification and Accreditation activities and technical or coordination activity and prepare the system Security Plans and update the Plan of Actions and Milestones POA&M. Periodically conduct a complete review of each system's audits and monitor corrective actions until all actions are closed.

Responsibilities: Shall perform specific activities that include, but not limited to the following:

  • Ingest threat information from internal and external sources for the purpose of targeted monitoring

  • Identify and report on gaps in monitoring visibility and strategy

  • Tune analytic correlations to reduce false positives and increase actionable alerts

  • Assess network threats such as computer viruses, exploits, and malicious attacks

  • Determine true threats, false positives and network system misconfigurations and provide solutions to issues detected in a timely manner

  • Monitor for potential compromise, intrusion, deficiency, significant event or threat to the security posture and security baseline

  • Develop, update and maintain standard operating procedures and other technical documentation for both client and internal operations

  • Train and mentor junior monitoring analysts

    Required Skills:

  • Current experience with network intrusion detection and response operations (Protect, Defend, Respond and Sustain methodology)

  • Experience in the detection, response, mitigation, and/or reporting of cyber threats affecting client networks and one or more of the following:

  • Experience in computer intrusion analysis and incident response

  • Working knowledge of Intrusion detection/protection systems

  • Knowledge and understanding of network devices, multiple operating systems, and secure architectures

  • Working knowledge of network protocols and common services

  • System log analysis

  • Experience responding to and resolving situations caused by network attacks

  • Ability to assess information of network threats such as scans, computer viruses or complex attacks

  • Working knowledge of WAN/LAN concepts and technologies

  • SIEM content Analysis, Development and Testing

  • Experience with SIEMS (such as NetWitness, Splunk, SumoLogic, QRadar)

  • Experience with EDR solutions (Carbon Black, Crowdstrike, FireEye, SentinelOne)

  • Familiarity with packet analysis to include: HTTP Headers & Status codes, SMTP Traffic & Status codes, FTP Traffic & Status Codes

  • Excellent written and verbal communication skills

  • Prior experience working in any of the following:

  • Security Operations Center (SOC)

  • Network Operations Center (NOC)

  • Computer Incident Response Team (CIRT)

  • Knowledge of and practical experience of integration of COTS or open source tools

  • Personality traits: Naturally curious and inquisitive nature; persistent and determined; loves solving problems and puzzles; analytically rigorous; uncompromising integrity

  • Demonstrated ability to document processes

  • Proficiency with MS Office Applications

  • Must be able to work collaboratively across teams and physical locations

  • Willing to work rotating shifts

  • Must have an active Top Secret Clearance with the ability to attain a TS/SCI clearance

    Required Certifications: Possess at least one relevant professional designation or related advanced IT certification , but not limited to the following:

  • Certified Information Systems Security Professional (CISSP)

  • GIAC Certified Incident Handler (GCIH)

  • GIAC Network Forensic Analyst (GNFA)

  • GIAC Intrusion Analyst (GCIA)

    Desire Skills:

  • Experience with RSA Netwitness, Splunk, FireEye NX, EX, HX, AX, Carbon Black Response, RSA Archer

  • Experience with firewalls, routers or antivirus appliances

  • Experience working on a 24x7x365 watch desk environment

  • Experience with industry standard help desk tools

    Desired Certifications: Possess at least one relevant professional designation or related advanced IT certification , but not limited to the following:

  • GIAC Certified Enterprise Defender (GCED)

  • GIAC Security Expert (GSE)

  • Certified Information Security Manager (CISM)

  • Certified Ethical Hacker (CEH)

    Required Education (including Major): Bachelor of Science Degree with major in Computer Science/Electrical Engineering, Engineering, Science or related field. Must have a minimum of 2+ years’ experience or equivalent education and experience.

  • Occasional travel within CONUS and OCONUS is required

Due to a customer requirement, as a condition of employment for this position, the successful candidate will be required to obtain and provide proof of COVID-19 vaccination prior to commencing employment or submit to regular COVID testing.

185777

Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.

DirectEmployers