Cyber Threat Intelligence Analyst @ Raytheon | Jobright.ai
JOBSarrow
RecommendedLiked
0
Applied
0
Cyber Threat Intelligence Analyst jobs in Morrisville, NC
83 applicants
company-logo

Raytheon · 5 days ago

Cyber Threat Intelligence Analyst

Wonder how qualified you are to the job?

ftfMaximize your interview chances
Intellectual PropertyInternet

Insider Connection @Raytheon

Discover valuable connections within the company who might provide insights and potential referrals, giving your job application an inside edge.

Responsibilities

Implement a dynamic, advanced Risk-Based Alerting (RBA) security framework within Splunk.
Create and test detections written in advanced Splunk Programming Language (SPL).
Perform analysis on hosts running on a variety of platforms and operating systems, to include Microsoft Windows & Linux.
Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system logs) to identify possible threats to network security.
Leverage tools including Splunk, Tanium, Firepower, Azure, GoogleCloud, SentinelOne, SESC suite as part of duties performing cyber incident response analysis.
Act as an observer to Red Team penetration testing exercises and collaborating with Cybersecurity Operations Center (CSOC).
Correlate event or incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.
Work with a diverse team of analysts in conducting incident triage, incident handling, and remediation.
Identifies and assesses the capabilities and activities of cyber criminals or foreign intelligence entities; produces finds to help initialize or support law enforcement and counterintelligence investigations or activities.

Qualification

Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.

Cyber threat intelligence analysisCyber defense techniquesAdversary tacticsBoolean logicTcp/ip fundamentalsNetwork level exploitsThreat managementRoutingSwitchingStatistical modelingInvestigations analysisWindowsLinuxDatabaseApplicationWeb serverFirewallSiemIntelligence cycleCyber kill chainDiamond modelSecurity clearanceProblem-solvingCommunicationInterpersonalOrganizationalMotivatedTeamworkNetwork Vulnerability TestingRecorded Future

Required

Must be eligible to obtain a sensitive clearance – Position of Public Trust – and may be required to obtain a higher security clearance.
Must have strong working knowledge of: Cyber Threat Intelligence Analysis and Reporting, Cyber Defense Techniques, Adversary Tactics, Techniques, and Procedures (TTPs), Boolean Logic, TCP/IP Fundamentals, Network Level Exploits, Threat Management
Must have excellent oral and written communication skills.
Must have excellent interpersonal and organizational skills.
5+ years related work experience and a Bachelor's degree.
Networking experience, with routing, switching, and analysis experience.
Statistical modeling and analysis experience to infer possible cybersecurity threats.
Experience in analysis in investigations, such as in IT, law enforcement, military intelligence, or business analytics.
Interest in learning about Windows, Linux, Database, Application, Web server, firewall, SIEM etc. log analysis.
Strong communication and interpersonal skills to effectively communicate with team-members.
Must be highly motivated with the ability to self-start, prioritize, multi-task and work in a team setting.
Understanding of intelligence cycle, Cyber Kill Chain, and Diamond Model.
Bachelor of Science Degree with a major in Computer Science/Computer Engineering, Engineering, Science or a related field. In lieu of degree, two additional years of related work experience may be substituted for each year of degree-level education.
The ability to obtain and maintain a U.S. government issued security clearance is required. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance.

Preferred

5+ years of experience working as a Cyber Threat Intelligence Analyst.
Familiarity with common network vulnerability/penetration testing.
Experience with, Recorded Future, Tanium, Redseal, and/or Anomali.
An understanding of log data for Sourcefire, Brightmail, Blue Coat, and Tipping Point.
Experience evaluating systems and network devices and enterprise networks for IA vulnerabilities.
Experience evaluating enterprise networks for IA/security vulnerabilities.
Splunk query-development expertise.
Experience on an Incident Response team performing Tier I/II initial incident triage.
Excellent writing skills.
Desired Certifications (one or more is desired): DOD 8570.1-M Compliance at IAT Level II; CISSP, Certified Ethical Hacker (C|EH), SFCP, GCIA, SEC +, or SANS.

Benefits

Medical
Dental
Vision
Life insurance
Short-term disability
Long-term disability
401(k) match
Flexible spending accounts
Flexible work schedules
Employee assistance program
Employee Scholar Program
Parental leave
Paid time off
Holidays

Company

Raytheon

company-logo
Raytheon, an RTX business, creates next-generation defense solutions that are smarter, faster and better than previously thought possible.

Funding

Current Stage
Late Stage
Total Funding
$16M
Key Investors
United States Air Force
2012-01-17Series Unknown· $5.5M
2009-10-26Acquired· by Raytheon ($350M)
2009-10-01Series Unknown· $10.5M

Leadership Team

leader-logo
Arunava Chatterjee
Executive Director of Ghost Black Operations & CEO & CTO
linkedin
leader-logo
Kieran Nolan
Chief Enterprise Architect / IT CTO
linkedin
Company data provided by crunchbase
logo

Orion

Your AI Copilot