Raytheon Veterans Jobs

Job Information

Raytheon Technologies Cyber Threat Hunter in Rosslyn, Virginia

Raytheon Intelligence & Space (RIS) – Cybersecurity, Training & Services (CTS) has an immediate opening for a

Cyber Threat Hunter

to support a U.S. Federal Agency contract to enable mission accomplishment by identifying current and emerging threat trends, threat actors using a variety of cyber threat intelligence sources.

Provide technical assessments of cyber threat actor use of cyber vulnerabilities, exploits, payloads, access infrastructures, and mission platforms.

Conduct all-source research on cyber threat actors and intrusion sets (e.g., APTs); evaluate both technical and Intel reporting for cyber threat activities of interest. Conduct detailed analysis of incidents, threats, vulnerabilities, tactics, techniques and procedures (TTP), and other malicious and non-malicious indicators.

Work Location: National Capital Region (Rosslyn, VA)

Job

Description:

Perform assessments of systems and networks within the networking environment or enclave and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy.

This is achieved through passive evaluations such as compliance audits and active evaluations such as vulnerability assessments.

Establishes strict program control processes to ensure mitigation of risks and supports obtaining certification and accreditation of systems.

Includes support of process, analysis, coordination, security certification test, security documentation, as well as investigations, software research, hardware introduction and release, emerging technology research inspections and periodic audits.

Assist in the implementation of the required government policy (i.e., NISPOM, DCID 6-3), make recommendations on process tailoring, participate in and document process activities.

Perform analyses to validate established security requirements and to recommend additional security requirements and safeguards.

Support the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results and preparation of required reports.

Document the results of Certification and Accreditation activities and technical or coordination activity and prepare the system Security Plans and update the Plan of Actions and Milestones POA&M.

Periodically conduct a complete review of each system's audits and monitor corrective actions until all actions are closed.

Responsibilities:

Shall perform specific activities that include, but not limited to the following:

Ingest threat information from internal and external sources for the purpose of targeted monitoring

Identify and report on gaps in monitoring visibility and strategy

Tune analytic correlations to reduce false positives and increase actionable alerts

Assess network threats such as computer viruses, exploits, and malicious attacks

Determine true threats, false positives and network system misconfigurations and provide solutions to issues detected in a timely manner

Monitor for potential compromise, intrusion, deficiency, significant event or threat to the security posture and security baseline

Develop, update and maintain standard operating procedures and other technical documentation for both client and internal operations

Train and mentor mid-level and junior monitoring analysts

Required

Skills:

Current experience with network intrusion detection and response operations (Protect, Defend, Respond and Sustain methodology)

Experience in the detection, response, mitigation, and/or reporting of cyber threats affecting client networks and one or more of the following:

Experience in computer intrusion analysis and incident response

Working knowledge of Intrusion detection/protection systems

Knowledge and understanding of network devices, multiple operating systems, and secure architectures

Working knowledge of network protocols and common services

System log analysis

Experience responding to and resolving situations caused by network attacks

Ability to assess information of network threats such as scans, computer viruses or complex attacks

Working knowledge of WAN/LAN concepts and technologies

SIEM content Analysis, Development and Testing

Experience with SIEMS (such as NetWitness, Splunk, SumoLogic, QRadar)

Experience with EDR solutions (Carbon Black, Crowdstrike, FireEye, SentinelOne)

Familiarity with packet analysis to include: HTTP Headers & Status codes, SMTP Traffic & Status codes, FTP Traffic & Status Codes

Excellent written and verbal communication skills

Prior experience working in any of the following:

Security Operations Center (SOC)

Network Operations Center (NOC)

Computer Incident Response Team (CIRT)

Knowledge of and practical experience of integration of COTS or open source tools

Personality traits: Naturally curious and inquisitive nature; persistent and determined; loves solving problems and puzzles; analytically rigorous; uncompromising integrity

Demonstrated ability to document processes

Proficiency with MS Office Applications

Must be able to work collaboratively across teams and physical locations

Willing to work rotating shifts

Must have an active Top Secret Clearance with the ability

to obtain a TS/SCI clearance

Required Certifications:

Possess at least one relevant professional designation

or related advanced IT certification

, but not limited to the following:

Certified

Information

Systems

Security

Professional

(CISSP)

GIAC

Certified

Incident

Handler

(GCIH)

GIAC Network Forensic Analyst (GNFA)

GIAC Intrusion Analyst (GCIA)

Desire Skills:

Experience with RSA Netwitness, Splunk, FireEye NX, EX, HX, AX, Carbon Black Response, RSA Archer

Experience with firewalls, routers or antivirus appliances

Experience working on a 24x7x365 watch desk environment

Experience with industry standard help desk tools

Desired Certifications:

Possess at least one relevant professional designation

or related advanced IT certification

, but not limited to the following:

GIAC

Certified

Enterprise

Defender

(GCED)

GIAC

Security Expert (GSE)

Certified

Information

Security

Manager

(CISM)

Certified Ethical Hacker (CEH)

Required Education (including Major):

Bachelor of Science Degree with major in Computer Science/Electrical Engineering, Engineering, Science or related field.

Must have a minimum of 5+ years’ experience or equivalent education and experience.

Occasional travel within CONUS and OCONUS is required

165383

Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.

DirectEmployers