1+ months

Jr. SOC Analyst (2nd Shift)

Raytheon Missle Systems
Dulles, VA 20164

Raytheon Technologies has an immediate opening for a
Jr. Cyber SOC Analyst (2nd Shift 3pm-11pm)
in the DC Metro area. The successful candidate will be able to effectively analyze all relevant cyber security event data and other information sources for suspicious network traffic, attack indicators and potential security breaches; produce reports, assist in coordination during incidents.
*This position does not provide relocation*
Raytheon Technologies Background:
We pride ourselves on having the most highly-skilled Security Analysts in the industry. Regardless of technology or process specialization, every Analyst is trained in the fundamentals of support, analysis and research into exceptionally complex problems, and processes relating to Cyber Defense and Security Operations Center subject matter.
Responsibilities:
Tier 1 Security Operations Support
Serving as a central clearing house for all alerts coming into the SOC on a daily basis with an emphasis on DNS blackholing, email-based, Host-based IDS, Network-based IDS, Authentication-related and feed/sensor check alerts
Continuous & persistent monitoring of security technologies/tool data and network traffic which result in security alerts generated, parsed, triggered, or observed on the in-scope managed networks, enclaves, systems or security technologies
Analyzing, triaging, aggregating, escalating and reporting on client security events including investigation of anomalous network activity, and responds to cyber incidents within the network environment or enclave
Correlation and trend analysis of security logs, network traffic, security alerts, events and incidents
Diligently gather information prior to escalation to support root cause analysis
Event and incident handling consistent with applicable client plans and processes
Integration of activities with standard reports, such as shift reports, along with client communication protocols
Supporting calculation of security metrics
Communication/Client Engagement/Responsiveness
Collaboration with the clients Security Organization via email, conference call, and phone
Provide feedback to other team members on security control efficacy, vulnerabilities, gaps in visibility, recurring issues, and other items of note
Collaborating with the owners of cyber defense tools to tune systems for optimum performance
Responsiveness to client-initiated requests and reports
Reporting and communications consistent with client SLAs
Support development of shift reports, Situation Reports and After Action Reports
Duties as assigned by the SOC Manager or Senior Analysts including:
Assess network threats such as computer viruses, exploits, and malicious attacks
Determining true threats, false positives and network system mis-configurations and provide solutions to issues detected in a timely manner
Monitor for potential compromise, intrusion, deficiency, significant event or threat to the security posture and security baseline
Develop, update and maintain standard operating procedures and other technical documentation for both client and internal operations.
Participate in customer calls and meetings on a regular basis.
Maintain current knowledge of relevant technology and trends.
Required Skills:
Prior experience working in any of the following three: Security Operations Center (SOC), Network Operations Center (NOC), Computer Incident Response Team (CIRT)
Experience in the detection, response, mitigation, and/or reporting of cyber threats affecting client networks and one or more of the following:
Experience in computer intrusion analysis and incident response
Knowledge and understanding of network devices, multiple operating systems, and secure architectures
Working knowledge of network protocols and common services
System log analysis
Current experience with network intrusion detection and response operations (Protect, Defend, Respond and Sustain methodology)
Experience responding to and resolving situations caused by network attacks
Ability to assess information of network threats such as scans, computer viruses or complex attacks
6 months recent experience (within the last 2 years) with Network Forensic technologies
6 months recent experience (within the last 2 years) with SIEM technologies
Excellent written and verbal communication skills;
Personality traits: Naturally curious and inquisitive nature; persistent and determined; loves solving problems and puzzles; analytically rigorous; uncompromising integrity.
Desired Skills:
Experience with Splunk, FireEye, Archer
Experience with firewalls, routers or antivirus appliances
Experience working on a 24x7x365 watch desk environment
Experience with industry standard help desk tools
Desired Certifications:
One or more of the following:
Splunk Core Certified Power User
Security+
Network+
A+
CCSA
CCSE
GCIA
GCIH
GNFA
CCNP
Required Education/Experience:
Bachelors Degree in Cyber Security, Information Security, Information Assurance or similar and 2+ years of related experience (concentration of security operations and analysis).
Additional experience can be used in lieu of education.
163240

Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.

Categories

Posted: 2020-07-01 Expires: 2020-09-01

Before you go...

Our free job seeker tools include alerts for new jobs, saving your favorites, optimized job matching, and more! Just enter your email below.

Share this job:

Jr. SOC Analyst (2nd Shift)

Raytheon Missle Systems
Dulles, VA 20164

Join us to start saving your Favorite Jobs!

Sign In Create Account
Powered ByCareerCast