Sr Com Sys Sec Tchnlgst I Information Technology (IT) - Dulles, VA at Geebo

Sr Com Sys Sec Tchnlgst I

Company Name:
Raytheon
Sr Com Sys Sec Tchnlgst I The Corporate
information technology
Security group is looking for a Threat Analyst/Incident Responder to join Raytheon's
computer
Emergency Response Team (RayCERT). The primary responsibilities of this position are: Enterprise-level incident response (IR) for cyber security
events
involving suspected intrusions Pro-active management of enterprise information security resources Technical evaluation of enterprise networks, systems, and applications against the cyber threat and associated risk of cyber attack Ownership of specific incident response processes and capabilities to include activities from training other analysts to championing new tools The position requires entry-to-mid level knowledge and experience in the following areas: Incident Handling - The Threat Analyst leads response activities for Enterprise-level cyber security incidents, provides situational awareness to appropriate personnel through clear and concise communications, and promotes a proactive response to possible threats by staying current with, analyzing, and identifying mitigations for emerging threats to Raytheon's IT infrastructure. Experience developing and implementing IDS / IPS signatures and URL / IP blocks is desirable. In order to accomplish these tasks, the Threat Analyst works closely with cyber intelligence analysts, digital forensics investigators, malicious code reverse engineers, Security Operations Center (SOC) analysts, and Raytheon Business Units affected by cyber security events. The Threat Analyst must exhibit the ability to effectively coordinate and manage IR actions, personnel support, and executive-level communications. A successful track record of project management experience is desirable. Technical Expertise - The Threat Analyst must possess functional knowledge in one or more of the following areas: Network Security - Candidate must possess technical knowledge of network-based attack methods, tools, and techniques; an expert understanding of network STIGs, and the effects of network hardening; hands-on experience configuring and analyzing firewalls, IDS / IPS, routers, and network security infrastructures; ability to correlated network security events to systems events, applications events, and intelligence indicators. Systems Security - Candidate must possess technical knowledge of systems attack methods, tools, and techniques; an understanding of Windows, Unix / Linux, and OS X environments, and the effects of systems hardening; experience deploying and securing servers, workstations, and appliances; in-depth understanding of computer forensics, log analysis; ability to correlate systems security events to network events, application events, and intelligence indicators. Applications Security - Candidate must possess technical knowledge of cross-site scripting, SQL injection, certificate high-jacking, and related attacks; expert understanding of secure coding practices, malicious code reverse engineering, application fuzzing, and the effects of application hardening; experience configuring databases, web servers, and active web content; ability to correlate applications security events to network events, system events, and intelligence indicators. Required Skills: Bachelor's degree in Computer Science, Computer Engineering, or equivalent education / professional experience, with 4 years experience directly related to technical aspects of cyber security. Self-driven and fully accountable for independent effort performed as part of a geographically dispersed virtual team supporting a high OPTEMPO mission. Excellent social, verbal, and written communication skills, with demonstrated ability to effectively present analytical data to a variety of technical and non-technical audiences. Demonstrated ability to formally document and establish well-defined processes, procedures, network mitigations strategies, and research reports derived from post incident analysis and lessons learned. Ability and willingness to accept direction, support leadership vision, and to serve as a leader for ad-hoc incident response teams consisting technical personnel directly supporting incident response, system owners, and executives. Experience supporting or leading incident response. Solid understanding of information security concepts, tools, and techniques. Working knowledge of networking concepts and web technologies. Working knowledge of Windows, UNIX / Linux, and OS X operating systems. Documented balance of relevant education, certification, and experience, with a demonstrable passion for excellence in Information Security. Ability and willingness to share on-call responsibilities, work non-standard hours, and travel (up to 25%) when required. Ability to obtain a U.S. Government Security Clearance (Secret or above). Desired Skills: Self-driven and fully accountable for independent effort performed as part of a geographically dispersed virtual team supporting a high OPTEMPO mission. Excellent social, verbal, and written communication skills, with demonstrated ability to effectively present analytical data to a variety of technical and non-technical audiences. Demonstrated ability to formally document and establish well-defined processes, procedures, network mitigations strategies, and research reports derived from post incident analysis and lessons learned. Ability and willingness to accept direction, support leadership vision, and to serve as a leader for ad-hoc incident response teams consisting technical personnel directly supporting incident response, system owners, and executives. Experience supporting or leading incident response. Solid understanding of information security concepts, tools, and techniques. Working knowledge of networking concepts and web technologies. Working knowledge of Windows, UNIX / Linux, and OS X operating systems. Documented balance of relevant education, certification, and experience, with a demonstrable passion for excellence in Information Security. Ability and willingness to share on-call responsibilities, work non-standard hours, and travel (up to 25%) when required. Ability to obtain a U.S. Government Security Clearance (Secret or above). Required Education (including Major): Bachelor's degree in Computer Science, Computer Engineering, Information Technology or equivalent education/experience, with 4 years experience directly related to technical aspects of cyber security. Raytheon Company, with 2012 sales of $24 billion and 68,000 employees worldwide, is a technology and innovation leader specializing in defense, homeland security and civil markets throughout the world. With a history of innovation spanning 91 years, Raytheon provides state-of-the-art
electronics
, mission systems integration and other capabilities in the areas of sensing; effects; and command, control, communications and intelligence systems; as well as a broad range of mission support
services
. Raytheon is headquartered in Waltham, Mass. For more about Raytheon, visit us at and follow us on . Raytheon is an equal opportunity employer and considers qualified applicants for employment without regard to race, color, creed, religion, national origin, sex, sexual orientation, gender identity and expression, age, disability, or Vietnam era, or other eligible veteran status, or any other protected factor. BACH_a33d1a BETS_ARC_Setter MYK62683JREstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.