Insider Threat Cyber Defense Analyst

Raytheon

Benefits
  • Job Description :Raytheon Technologies has an immediate opening for a Senior Insider Threat Cyber Defense Analyst. The candidate will be able to perform as a specialist in insider threat analysis to support the customer team. In doing so, the candidate effectively liaisons with other RCS resources to drive the insider threat function.

This position is on-site in the Washington, DC Metro Area and does not provide relocation assistance.

This position will operate within a structured shift schedule.

The shifts for this Senior Level Insider Threat Cyber Defense Analyst include:

  • Mon – Fri, 6am – 3pm

Hiring is conditional on the candidate being able to pass a background/drug screening and any additional screenings for customer access. Offers are contingent on contract award.

Responsibilities:

  • Directly supports cyber security mission while conducting in-depth strategic analysis of intelligence data from various sources.
  • Provides leadership to and manages a team of insider threat personnel
  • Will collect and analyze all-source data to compile strategic papers and/or briefings and possess the ability to present findings to project leads/managers and the IC as a subject matter expert as required.
  • Analysis and distribution of all-source information as required.
  • Conduct internal and external liaison
  • Performs threat analysis, threat forecasts and threat alerts, and recommends countermeasures;
  • Conduct insider threat investigations/inquiries and prepare formal reports of findings and recommendations
  • Will collaborate with intelligence community (IC) and Federal Civil partners to share and collect cyber threat data for use in strategic threat assessments, prioritization of resources and development of lead generation.
  • Support shift work (1st, 2nd, or 3rd shift) as assigned

Required Skills:

  • Knowledge of Insider Threat investigations, reporting, investigative tools and laws/regulations.
  • Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
  • Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).
  • Must be an experienced intelligence/counterintelligence analyst with understanding of cyber (e.g. computer security, networking) and foreign threats (capabilities & intentions) to U.S. Government networks.
  • Must have a strong understanding of the intelligence cycle, to include: planning, collection, research, analysis, and production.
  • Strong understanding of intelligence analytical methods and sources
  • Should be familiar with Foreign Intelligence and Security Service (FISS) use of technology to target, collect and exploit DoD information and information systems, personnel, and operations.
  • Must have a thorough understanding of all-source analysis and the proper use of basic analytic tools and databases (i.e. Analyst Notebook, HOTR).
  • Must be able to identify intelligence gaps, specify and evaluate collection requirements to fill said gaps.
  • Demonstrated ability to integrate cyber security related data from host network audits, central analysis, and other related sources into investigative or analytical products
  • Ability to work within a multi-disciplined team
  • Must possess a strong working knowledge of all Microsoft applications and commonly used analytic software tools (i.e., Word, Excel, PowerPoint, and Access).
  • Must be able to work collaboratively across agencies and physical locations
  • Must have experience using multiple Intelligence Community database search tools and familiarity with intelligence monitoring, collection, targeting and reporting
  • Must have working familiarity with Intelligence Community management of information, classification, dissemination and information and records system

Desired Skills:

  • Be trained and proficient with one or more insider threat monitoring tools
  • 3+ years cyber counter intelligence experience
  • Experience and familiarity with Nessus, Splunk, YARA, CoFense Triage
  • Understanding of Intrusion Detection Systems (IDS/Intrusion Prevention Systems (IPS) and ability to analyze captured data
  • Experience with insider threat monitoring tools
  • Experience supporting Intelligence and/or DoD Customers
  • Experience with operational counter-intelligence
  • Understanding of process development and deployment
  • Excellent writing skills

Experience:

8+ years of related experience (concentration of security operations and analysis)

3+ years cyber counter intelligence experience

Education:

Bachelor's degree in STEM area. Work experience and/or certifications may be substituted in lieu of Bachelor's degree.

Certificates:

Possessing the following Certifications is desired or the ability to obtain 1 of the following:

  • Security+
  • Network+
  • CEH

Or related advanced IT certification

163524

Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.

Read Full Description

Discover Similar Jobs

Suggested Articles