Host-Based Systems Analyst with Security Clearance

Raytheon Intelligence and Information Services (IIS) - Cyber Security & Special Missions (CSM) has an immediate opening for a Host-Based Systems Analyst to support the customer team. The ideal candidate for this job will be an experienced information security practitioner who is goal-oriented and strives to exceed expectations. This position requires experience in providing leadership and vision in incident handling, response, and analysis. Must be hands-on and have intimate knowledge and experience in cybersecurity, incident response, and analysis; digital forensics; security vulnerabilities/weaknesses and related attacks; network security issues and encryption technologies; management of lab environments to include flyaway kits. Job Description Uses leading edge technology and industry standard forensic tools and procedures to provide insight into the cause and effect of suspected cyber intrusions; and Follows proper evidence handling procedures and chain of custody protocols; and Produces written reports documenting digital forensic findings; and Determines programs that have been executed, finds files that have been changed on disk and in memory; and Uses timestamps and logs (host and network) to develop authoritative timelines of activity; and Finds evidence of deleted files and hidden data; and Identifies and documents case relevant file-system artifacts (browser histories, account usage and USB histories, etc.); and Creates forensically sound duplicates of evidence (forensic image) to use for data recovery and analysis; and Performs all-source research for similar or related network events or incidents; and Possesses skill in identifying different classes of attacks and attack stages; and Knowledge of system and application security threats and vulnerabilities; and Knowledge in proactive analysis of systems and networks, to include creating trust levels of critical resources. REQUIRED SKILLS: Demonstrated to advanced operational experience as a Systems Analyst Demonstrated to advanced experience with computer networking and operating systems Demonstrated to advanced experience of current threats, vulnerabilities, and attack trends Critical thinking and problem solving skills Demonstrated to advanced experience working directly with customers to transfer Threat Hunting knowledge Possess good time management and written and oral communications skills Experience with some/all of: Hadoop, Apache NiFi, Kafka, Storm, Metron, Spark, Ambari, Kibana/Zeppelin, ThreatQ, FireEye Malware analysis Familiarity with: Netflow data, DNS logs, Proxy Logs DESIRED SKILLS/CERTIFICATIONS: GCFA GCFE REQUIRED EDUCATION/EXPERIENCE: This position require a Bachelor-s degree in a related discipline with a minimum of six (6) years directly related experience. Equivalent years of directly related experience may be considered in lieu of educational requirements. REQUIRED Clearance: TS/SCI Location: Arlington VA This position requires a U.S. Person who is eligible to obtain any required Export Authorization. 127669 Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status. ? Last Modified: 11/9/2018 11:21:23 PM Category: Computer Engineering, Computer Science, Information Technology, Cyber, Data Science, Engineering Technology, General Engineering, Information and Knowledge Systems, Software Engineering, Systems Engineering, Engineering, All, Warfighter Support Services businessunit: Intelligence, Information and Services Job Type: Professional Jobs Job Industry: Arlington
Top Secret/SCI

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.