Cyber Security Analyst (Level 1)

Raytheon Technologies Corporation

Raytheon Technologies Corporation is an Aerospace and Defense company that provides advanced systems and services for commercial, military and government customers worldwide. It comprises four industry-leading businesses – Collins Aerospace Systems, Pratt & Whitney, Raytheon Intelligence & Space and Raytheon Missiles & Defense. Its 195,000 employees enable the company to operate at the edge of known science as they imagine and deliver solutions that push the boundaries in quantum physics, electric propulsion, directed energy, hypersonics, avionics and cybersecurity. The company, formed in 2020 through the combination of Raytheon Company and the United Technologies Corporation aerospace businesses, is headquartered in Waltham, Massachusetts.

To realize our full potential, Raytheon Technologies is committed to creating a company where all employees are respected, valued and supported in the pursuit of their goals. We know companies that embrace diversity in all its forms not only deliver stronger business results, but also become a force for good, fueling stronger business performance and greater opportunity for employees, partners, investors and communities to succeed

Cyber Security Analyst

The Cyber Security Analyst utilizes internal processes and tools to detect and respond to various threats.

Principal Responsibilities:

  • Monitor, analyze and investigate alerts from various log sources including IDS/IPS, firewalls, proxies, servers, endpoints and other network devices in an enterprise security information and event monitoring (SIEM).
  • Recommend and initiate appropriate response or escalation activities using established event handling and incident response procedures based on risk categorization.
  • Collaborate with peers and stakeholders across the Corporate and Business Unit cyber security and information technology organizations.
  • Perform other duties as assigned.

Experience/Qualifications:

  • Minimum 1-2 years applicable work experience in Network Support, Security Operations or Incident Response and conversant with cyber security concepts and techniques.
  • Demonstrable knowledge of networking (TCP/IP, topology, and security), operating systems (Windows/UNIX), and web technologies (Internet security).
  • Understand system data, including, but not limited to, security event logs, system logs, and firewall logs.
  • Excellent written and verbal communication skills; must be able to communicate technical details clearly and concisely with peers and all levels of management.
  • Capability to think and operate independently or in a team environment with minimal supervision.
  • A proactive. analytical and results driven mindset.
  • Highly detail oriented.
  • Strong background in process and procedure with the ability to develop, revise and execute standard work.
  • Organizational skills to manage multiple competing priorities and deadlines in a fast-paced working environment.
  • Proven ability to troubleshoot and solve technical issues.

Candidate must have technical experience in the following areas:

  • Network analysis using tcpdump, Wireshark or other packet capture/inspection tools.
  • Searching, interpreting and working with data from enterprise logging systems including syslog, netflow, Splunk or other SIEM/SIEM platforms.
  • Endpoint protection suites such as Symantec, McAfee, Carbon Black, Forcepoint or Tanium.

Education:

Typically requires a university degree or equivalent experience and minimum 1-3 years prior relevant experience

Location:

  • Onsite in Farmington, CT
  • Temporary Telecommuting Due to Covid

Availability:

  • Ability to work 24/7/365 shift coverage (days, nights, weekends, holidays, or alternate non-traditional schedules as needed.)

Required Status:

  • US Citizen required as work may involve visibility to ITAR related projects.

Job ID: 01499487

More Information

Apply for this job

Leave your thoughts