Cyber Intel Analyst

Arlington, Virginia, USA

Raytheon Intelligence & Space (RIS) – Cybersecurity, Training & Services (CTS) has an immediate opening for a cleared Cyber Intel Analyst to support a U.S. Federal Agency contract to enable mission accomplishment by supporting the installation, configuration, capacity planning, administration, service restoration, optimization, and operational maintenance of cyber defense solutions.  Identifying current and emerging threat trends, threat actors using a variety of cyber threat intelligence sources.  Provide technical assessments of cyber threat actor use of cyber vulnerabilities, exploits, payloads, access infrastructures, and mission platforms.  Conduct all-source research on cyber threat actors and intrusion sets (e.g., APTs); evaluate both technical and Intel reporting for cyber threat activities of interest. Conduct detailed analysis of incidents, threats, vulnerabilities, tactics, techniques and procedures (TTP), and other malicious and non-malicious indicators.

Work Location: National Capital Region (Rosslyn, VA)

Job Description:
Provides analysis and research for industry, infrastructure, technology, country, geographic area, biographic and targeted vulnerability. Prepares assessments of current events based on the sophisticated collection, research and analysis of classified and open source information. Develops and maintains analytical procedures to meet changing requirements and ensure maximum operations. Collects data using a combination of standard intelligence methods and business processes.
* An active TS clearance is required.
Shall perform specific activities that include, but not limited to the following:
Coordinate with Cyber Defense Analysts to manage and administer the updating of rules, security content, and signatures for specialized cyber defense applications
Build, install, configure, and test dedicated cyber defense solutions
Perform incident resolution and root cause problem determination to ensure availability and stability of cyber defense solutions
Assist in assessing the impact of implementing and sustaining dedicated cyber defense infrastructure
Create, edit, and manage access controls on specialized cyber defense systems
Develop and maintain documentation for operational procedures, troubleshooting aids, and technical analysis for products, features and capabilities
Document procedures and execute backup and recovery activities on cyber defense solutions
Train and mentor mid-level and junior monitoring analysts
Required Skills:
Current experience with network intrusion detection and response operations (Protect, Defend, Respond and Sustain methodology)
Experience in the detection, response, mitigation, and/or reporting of cyber threats affecting client networks and one or more of the following:
Experience in computer intrusion analysis and incident response
Working knowledge of Intrusion detection/protection systems
Knowledge and understanding of network devices, multiple operating systems, and secure architectures
Working knowledge of network protocols and common services
System log analysis
Experience responding to and resolving situations caused by network attacks
Ability to assess information of network threats such as scans, computer viruses or complex attacks
Working knowledge of WAN/LAN concepts and technologies
SIEM content Analysis, Development and Testing
Experience with SIEMS (such as NetWitness, Splunk, SumoLogic, QRadar)
Experience with EDR solutions (Carbon Black, Crowdstrike, FireEye, SentinelOne)
Familiarity with packet analysis to include: HTTP Headers & Status codes, SMTP Traffic & Status codes, FTP Traffic & Status Codes
Excellent written and verbal communication skills
Prior experience working in any of the following:
Security Operations Center (SOC)
Network Operations Center (NOC)
Computer Incident Response Team (CIRT)
Knowledge of and practical experience of integration of COTS or open source tools
Personality traits: Naturally curious and inquisitive nature; persistent and determined; loves solving problems and puzzles; analytically rigorous; uncompromising integrity
Demonstrated ability to document processes
Proficiency with MS Office Applications
Must be able to work collaboratively across teams and physical locations
Willing to work rotating shifts
Must have an active TS clearance
Required Certifications:
Possess at least one relevant professional designation or related advanced IT certification, but not limited to the following:
Certified Information Systems Security Professional (CISSP)
GIAC Certified Incident Handler (GCIH)
GIAC Network Forensic Analyst (GNFA)
GIAC Intrusion Analyst (GCIA)
Desired Skills:
Experience with RSA Netwitness, Splunk, FireEye NX, EX, HX, AX, Carbon Black Response, RSA Archer
Experience with firewalls, routers or antivirus appliances
Experience working on a 24x7x365 watch desk environment
Experience with industry standard help desk tools
Desired Certifications:
Possess at least one relevant professional designation or related advanced IT certification, but not limited to the following:
GIAC Certified Enterprise Defender (GCED)
GIAC Security Expert (GSE)
Certified Information Security Manager (CISM)
Certified Ethical Hacker (CEH)
Required Education (including Major):
Bachelor of Science Degree with major in Computer Science/Electrical Engineering, Engineering, Science or related field.  Must have a minimum of 5+ years’ experience or equivalent education and experience.
US Citizen with active or ability to attain TS or TS/SCI clearance
Occasional travel within CONUS and OCONUS is required

Relocation Eligible: No

Sign On Bonus Eligible: No

Rosslyn, VA





JBRTX // Equal Opportunity Employer // 185825BR

Mission: Connect professionals and employers.

FYI Notes

Cyber Intel Analyst