IIS Information Technology (IT) Security is seeking an IT Security Operations Center (SOC) Analyst (Third Shift) to join our IIS IT Security team. The IT SOC Analyst may be assigned to work in our internal Security Operations Center as well as customer Security Operations Centers. Assignments may be domestic and international.
Tier 1 security event monitoring and device oriented activities in the SOC with guidance of short-term projects such as upgrades, migrations and implementations on the part of the tier 3 and 4 staff.
Services monitored and delivered include, but are not limited to SIEM, IDS/IPS, Firewall, Web Content Filtering, Data Leak Prevention (DLP), Proxy, and Security Event Correlation and Reporting to appropriate Tier 2 incident handling staff or relevant sources to determine increased risk to the business.
Monitor IT defense perimeter and scanning infrastructure and communicate security events and incidents to applicable Computer Emergency Response Team personnel and/or management.
Monitor and analyze the output from various security perimeter monitoring devices and recommend security actions per procedures where required.
Perform reviews/audits of mixed Unix and Microsoft Windows environments, including network devices, databases, web services, and enterprise applications.
Coordinate with infrastructure support teams to maintain/trouble shoot defense perimeter and monitoring integrity.
Provide SOC services and consulting for domestic and international clients as required in support of Raytheon customers.
Required Skills, Experience:
DoD 8570 Information Assurance Training Certification (Security +)
Server + or MCP certification
Must have current Secret Clearance
U.S. Citizen in possession of a valid U.S. Passport
Conversant with security concepts and techniques
Ability to read and understand system data, including, but not limited to, security event logs, system logs, and firewall logs
An ability to work weekends, holidays, or alternate non-traditional schedules and shifts
Ability to work in a matrix environment
Experience developing and documenting processes and procedures related to IT security operations
Experience with one or more of the following classes of tools: Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Firewalls, SEIM systems, Insider Threat / Data Leak Prevention (DLP) monitoring systems, Anti-Virus systems
Traditional network monitoring experience (packet/protocol analysis)Hands-on administrative experience with major operating systems
Experience conducting Data Leak Prevention operations
Experience interfacing with external customers
Current US Government Security clearance: TS/SCI
Education Requirement: Bachelor's degree and at least 2 years of prior relevant experience; or an Associate's degree and at least 6 years of prior relevant experience; additional experience may be considered in lieu of degree.
This position requires a U.S. Person who is eligible to obtain any required Export Authorization. 130015
Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.