Advertisement

Experience:
Not specified
Concerned about your lack of experience? Learn More...
Employment Type:
Not Specified
Posted:
10/1/2019
Job Category:
IT / MIS
Industry:
Aerospace & Aeronautics
See more jobs for students and recent grads who studied:
Threat Analyst Tier 2/3
Raytheon Company | Bethesda, Maryland
Tell Us More About Your Job Preferences
By telling us what you think of this job, we can help find jobs that match your interests. If you want to see more jobs like this, click on the smiley face. Or if this job isn't what you are looking for, click the frowny face. Learn More...

Follow This Company
Share

Job Description

Threat Analyst Tier 2/3 (10-15YrsExpRequired)


SupportHHS-NIH ISPS (Information Security Program Support) customer contract to enable mission accomplishmentby analyzing allrelevantcyber security event data and other information sources for suspicious network traffic,attack indicators and potential security breaches; produce reports, assist in coordination during incidents. In support of the customer’sstrategic direction, key individuals support the Cyber Security OperationsCenter(CSOC)employing innovative technologies and techniques.
Location: CONUS

Must have a current TS/SCI clearance

The main objective of the NIH Information Security Program is to “safeguard the NIH personnel, patients, computers, networks and data that NIH relies on each day to fulfill its mission.” To achieve this objective, the NIH Information Security Program has established the following strategic goals:

Reduce High Risks: Reduce NIH high risk areas; prioritize/High Value Assets (HVAs)

Improve Protections: Improve protections for data, infrastructure, and staff

Complete Visibility: Provide continuous/increased visibility into IT assets, operations, threats, and risks

Integrate NIH Privacy Coordinators into accreditation and authorization processes

These goals will be achieved via NIH-specific initiatives and government-wide projects to promote IT management best practices, including configuration and patch management, system administration, and change and operations management. These activities will also be accomplished via implementation of DHS Continuous Diagnostic & Mitigation (CDM) program guidance and technologies, the NIH information security modernization initiative, and other NIH and HHS information security projects intended to protect and serve the NIH mission, patients, and staff.


Job Description:
Looking for qualified individuals who can support the developmentanddeployment of information technology services as a ThreatAnalyst Tier 2 directly supporting the Open SourceIntelligence (OSINT)Team Lead. A skillful threatanalyst in Social Media andOpen Source Intelligence (OSINT) analysis is needed to support the customerteam in support of ComputerNetwork Defense(CND) mission within the Cyber Security Operations Center (CSOC). The threatanalystsupports the development of all the threat intelligence team’sOSINToutputs:regularreports,ad hoc reports, andresearchrequestfrom senior CSOC leadership. The threat analyst is also responsibleformanaging the intake of threat data into the ThreatKnowledge ManagementSystem. The threatanalystcollects, processes, andanalyzes open source information to produce cyberintelligence output.

Responsibilities:
Support the team in conducting Advanced Persistent Threat (APT) analysis using research methods

DevelopSOPs/WIs to document allprocesses and procedures
Developmethods to integrate new tools into currentworkflows
Prepare,write,andpresentreportsandbriefingsasrequired
Collaboratewithstakeholders to facilitate aneffective OSINTresearchprogram
Provide training asrequired
Participates in specialprojects as required
Work with the customer to helpcoordinatechangesandupdates
KeepProgram Management informed of project status

Required Skills:
Existing US DOD TS/SCIClearance
US Citizenship
Willing to work rotating shifts
Knowledge ofSocial Media sources and trends
Knowledge in OSINT / Social Media analysis
Demonstrated ability to work in a teamand train teammates
Proficiency with MS Office Applications
Must be able to work collaboratively acrossagenciesandphysical locations
Ability to work within a multi-disciplined team
Demonstrated ability to integratecyber security relateddatafrom host network audits,central analysis, and other relatedsources into investigative oranalytical products
Desired Skills:8+ years relatedexperience
Experience with process development and deployment
Experience with training in new technologies
Experience analyzing geopoliticalevents using open sources
Excellentwriting & communications skills
Ability to speak and read English

DesiredCertifications:
Security+CE
or

GIAC Security Essentials Certification (GSEC) or
Systems Security Certified Practitioner (SSCP) or
CertifiedInformationSystems Security Professional(CISSP)

RequiredEducation(includingMajor):

BS in History,PoliticalScience,InternationalRelations, Counter Terrorism, or relatedfield. Must have a minimum of 5-10 years’experience,orequivalent education andexperience.Master’sDegree strongly preferred.

137633

Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.

Advertisement

About Raytheon Company

Raytheon Company is a technology and innovation leader specializing in defense, civil government and cybersecurity markets throughout the world. With a history of innovation spanning 92 years, Raytheon provides state-of-the-art electronics, mission systems integration and other capabilities in the areas of sensing; effects; and command, control, communications and intelligence systems; as well as a broad range of mission support services

 
Advertisement Advertisement