Cyber Security Technologist II- Information Assurance

Raytheon Huntsville , AL 35801

Posted 4 weeks ago

How do you protect against those with bad intentions? You create innovative technical processing solutions and collaborate with some of the finest talent in the IT field.

Whether you're an Information Systems Technologist or an Encryption Strategy Expert, at Raytheon you'll grow a varied and rewarding career. And you'll be supported with a comprehensive and competitive benefits package that promotes work/life balance. If you're ready to take on today's big challenges, discover a world of opportunity at Raytheon.

  • America's Best Large Employers by Forbes

  • Career & Development Opportunities

  • Full-time

  • Entry, Mid, Senior

Back to Job Navigation (Overview)

Responsibilities

This position can be an Information Assurance Cyber Specialist II or a Senior Information Assurance Cyber Specialist I based on the candidate's qualifications as they relate to the skills, experience and responsibility requirements for the position.

Information Operations and Information Assurance (IO/IA) are matters we take very seriously indeed. And so do our customers, from global governments to Fortune 500 companies. That's why they trust us to deliver the end-to-end offensive and defensive solutions that successfully protect them from a wide range of internal and external threats including breach, fraud, theft and sabotage.

The Information System Security Officer (ISSO) designs, develops, and recommends integrated security solutions for multiple classified systems/projects. The successful candidate will analyze and coordinate information assurance requirements for networked and standalone systems within environments of varying complexity levels.

They will also be responsible for creating and maintaining certification and accreditation documentation. The ISSO will design, develop, and recommend security solutions for platforms with various operating systems.

Successful candidates will ensure system security measures comply with multiple regulatory requirements (e.g. NISPOM, JAFAN, DCID/ICD 503, DoD RMF), and accurately assess the impact of modifications, changes, and vulnerabilities for each system where needed. They will coordinate their duties with selected Security, Information Technology, and Project Managers on a regular basis.

The ISSO will conduct reviews and technical inspections (as prescribed by the ISSM) to identify and mitigate potential security weaknesses, and ensure that all security features applied to a system are implemented and functional. They will also create and maintain all information assurance documentation (e.g. SSPs, Security Profiles, approvals, etc.) for their assigned areas.

Additional duties will include, but are not limited to the following:

Participates in interdepartmental projects and provides leadership as necessary.

Trains and mentors novice and intermediate ISSOs, and provides performance input to managers.

Interfaces with internal and external Security personnel, customers, management, and U.S. Government representatives where required.

Performs other IA-related duties as assigned by management on an "as required" basis.

Travel as needed to other business locations to provide necessary cyber security support.

Minimum Required Skills:

Bachelor's degree, or equivalent experience in lieu of degree, with 2 years of directly related experience. Master's degree with 0 years of directly related experience

Possess a minimum of a current, DoD active secret security clearance, US Citizenship statues required as this position needs active US Security Clearance as of day one of employment

Experience in the oversight and execution of a continuous monitoring/improvement program (to include but not limited to self-inspections, security control assessments, training, log management systems, automated inventory utilities, etc.)

Experience implementing the NISPOM, JAFAN 6/3, DCID 6/3, JSIG/RMF, ICD-503 or equivalent requirements to include technical computer/network system auditing

Experience successfully and respectfully interfacing with internal and external customers (i.e. AOs, DAOs, SCAs, Program Managers, etc.), to include negotiating controls/requirements with government Contracting Activities

Familiarity with documentation and tools such as: DoD 8500 series, NIST Special Publications (800-53, 800-37, etc.) SNAC Guides, Nessus, SCAP, ACAS, etc.

Able to obtain a DoD 8570.01-M IAM level I certified credentials (Security +, etc.)

Highly Desired Skills:

Experience with the identification, development, and reporting of IA program performance metrics and oversight of appropriate IA policy, processes and procedures

Knowledge in UNIX, Linux, Solaris, IRIX, SUSE, and MAC operating systems

Experience in the execution and management of Information System's (IS) incident response and administrative inquiries/investigations in collaboration with the Investigations department

Experience providing technical security expertise and oversight for complex, cross-domain, heterogeneous classified networked environments in collaboration with Customers, the Information Technology (IT) Department and other Raytheon Business Units

Experience with various types of special test equipment (STE)

Willing to travel on company business

Experience working with the customer, both internal and external in the development of Basis of Estimates (BOE's)

Public speaking experience

Currently possess DoD 8570.01-M IAM level III certified credentials (CISSP, CISM, etc.)

Experience in the oversight and execution of the Assessment & Authorization processes (Certification & Accreditation), as defined in JSIG/RMF

Experience in executing leadership and managerial duties (i.e. performance development, career coaching, mentoring, training, resource management, budget management, etc.)
155537BR 155537

Business Unit Profile

Raytheon Missile Systems (RMS) is the world leader in the design, development and production of missile systems for critical requirement including air-to-air, strike, surface Navy air defense, land combat missiles, guided projectiles, exoatmospheric kill vehicles, missile defense and directed energy weapons. RMS is headquartered in Tucson, Arizona with over 11,000 employees operating at sites across the country and internationally.

Relocation Eligible

Yes

Clearance Type

Secret - Current

Expertise

Computer Science

Computer/Management Information Systems

Configuration Management

Cyber Jobs

Information and Knowledge Systems

Type Of Job

Full Time

Work Location

AL - Huntsville

Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.



icon no score

See how you match
to the job

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Sr Information Security Specialist/ Incident Response

CGI Group Inc.

Posted 2 days ago

VIEW JOBS 2/18/2020 12:00:00 AM 2020-05-18T00:00 Meet our professionals CGI: An employer of choice Position Description: Job description Sr. Information Security Specialist- Incident Response CGI Federal is seeking qualified applicants for an Sr. Information Security Specialist position that will serve as part of a Cyber Threat Analysis Team (CTAC) in Huntsville, AL. Qualified applicants will be on the forefront of incident response where they will utilize the latest in network security technology to provide Computer Network Defense and Information Assurance (IA) support to CGI Federal and its customers. Your future duties and responsibilities: The responsibilities of this role include, but are not limited to: * Monitor and analyze network traffic and IDS alerts, respond to potential threats/vulnerabilities. * Respond to potential threats/vulnerabilities. * Investigate intrusion attempts and perform in-depth analysis of exploits. * Provide network intrusion detection expertise to support timely and effective decision making of when to declare an incident. * Conduct Open Source cyber threat intelligence research to identify threat actor motivations, capabilities, and intentions. * Create intelligence products based on observed incident activity, indicators of compromise and emerging cyber threats discovered in the wild. * Perform initial triage on security events that are populated in a Security Information and Event Management (SIEM) system. * Analyze a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the correct remediation actions and escalation paths for each incident. * Independently follow procedures to contain, analyze, and eradicate malicious activity. * Document all activities during an incident and providing leadership with status updates during the life cycle of the incident, as well as creating a detailed final report. * Develop advanced queries and alerts to detect adversary actions * Hunt for and identify threat actor groups based on their known techniques, tactics, procedures (TTPs), tools and infrastructure. * Provide information regarding intrusion events, security incidents, and other threat indications and warning information to US government agencies. * Assist with the development of processes and procedures to improve incident response times, analysis of incidents, and overall MDR/CTAC operations. * Mentor team members to improve quality and consistency of analysis. Required qualifications to be successful in this role: Education or Experience: * Minimum of two (2) years of direct experience in an IT Security, Incident Response or Security Analyst role within the last 4 years * Experience with cyber advanced persistent threats, actors, infrastructure, and TTPs * Knowledge of MITRE ATT&CK Framework * Experience and extensive knowledge working with a SIEM and performing triage, information gathering and analysis * Experience in Security Incident Handling and Incident Management procedures * Experience with writing clear and concise technical documents specifically event analysis and incident handling documentation * Experience with Intrusion Detection and Prevention Systems * Demonstrate knowledge of the TCP/IP stack and other protocols * Knowledge of computer networking, routing and switching * Experience with Endpoint Detection and Response (EDR) tools * Basic experience with scripting languages (Python, PowerShell, Bash, Go) * Knowledge of Security Orchestration, Automation and Response (SOAR) platforms * Experience with Linux/UNIX and Windows based devices at the System Administrator level * Working knowledge of security architectures and devices * In-depth knowledge of lateral movement methods, foothold tactics, and data exfiltration techniques * Knowledge with AWS/Azure/GCP logging capabilities and best practices * Experience with Account Management, Windows Events, and Log Management * Organizational skills and the ability to work autonomously with attention to detail and processes * Excellent communication skills with experience providing incident briefings to peers, management, and clients * Excellent written skills with experience creating formal incident reports DESIRED QUALIFICATIONS * Industry recognized professional certification such as CISSP, GCIH, GCIA, GCFA, CEH, Security+, CySA+ * Past experience with or current understanding of government intelligence processes and systems. * Direct experience with Malware and Fusion analysis techniques and methodologies. * Vendor certifications in SIEM or other relevant security toolset * Knowledge and understanding of NIST, FedRAMP, PCI, and other frameworks/compliances * US Federal Government security clearance (Public Trust), or the ability to obtain a clearance #CGIFEDERALJOB Skills: * Incident Response * Security Assessment * Security Monitoring AI What you can expect from us: Build your career with us. It is an extraordinary time to be in business. As digital transformation continues to accelerate, CGI is at the center of this change—supporting our clients' digital journeys and offering our professionals exciting career opportunities. At CGI, our success comes from the talent and commitment of our professionals. As one team, we share the challenges and rewards that come from growing our company, which reinforces our culture of ownership. All of our professionals benefit from the value we collectively create. Be part of building one of the largest independent technology and business services firms in the world. Learn more about CGI at www.cgi.com. No unsolicited agency referrals please. CGI is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to their race, ethnicity, ancestry, color, sex, religion, creed, age, national origin, citizenship status, disability, medical condition, military and veteran status, marital status, sexual orientation or perceived sexual orientation, gender, gender identity, and gender expression, familial status, political affiliation, genetic information, or any other legally protected status or characteristics. CGI provides reasonable accommodations to qualified individuals with disabilities. If you need an accommodation to apply for a job in the U.S., please email the CGI U.S. Employment Compliance mailbox at US_Employment_Compliance@cgi.com. You will need to reference the requisition number of the position in which you are interested. Your message will be routed to the appropriate recruiter who will assist you. Please note, this email address is only to be used for those individuals who need an accommodation to apply for a job. Emails for any other reason or those that do not include a requisition number will not be returned. We make it easy to translate military experience and skills! Click here to be directed to our site that is dedicated to veterans and transitioning service members. All CGI offers of employment in the U.S. are contingent upon the ability to successfully complete a background investigation. Background investigation components can vary dependent upon specific assignment and/or level of US government security clearance held. CGI will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with CGI's legal duty to furnish information. CGI Group Inc. Huntsville AL

Cyber Security Technologist II- Information Assurance

Raytheon