Job type full-time
Full job description
The following position is to join our corporate or research center team:
Raytheon technologies corporation
Raytheon technologies corporation is an aerospace and defense company that provides advanced systems and services for commercial, military and government customers worldwideIt comprises four industry-leading businesses – collins aerospace systems, pratt & whitney, raytheon intelligence & space and raytheon missiles & defenseIts 195,000 employees enable the company to operate at the edge of known science as they imagine and deliver solutions that push the boundaries in quantum physics, electric propulsion, directed energy, hypersonics, avionics and cybersecurityThe company, formed in 2020 through the combination of raytheon company and the united technologies corporation aerospace businesses, is headquartered in waltham, massachusetts.
To realize our full potential, raytheon technologies is committed to creating a company where all employees are respected, valued, and supported in the pursuit of their goalsWe know companies that embrace diversity in all its forms not only deliver stronger business results, but also become a force for good, fueling stronger business performance and greater opportunity for employees, partners, investors, and communities to succeed.
Raytheon’s cyber operations group within enterprise service’s information technology division is looking for a computer forensics analyst for the forensic technical services (fts) teamAs a part of cyber operation, the holder of this position will provide data analysis to identify both threats targeted at the defense community as well as the associated mitigation steps.
Raytheon technologies cyber forensics, investigations and development group is looking for an experienced forensic analystThis individual will work with multiple teams within and beyond cyber operations to analyze compromised computer systems in a forensically-sound manner, perform both forensic triage and “deep-dive forensic” analysis, participate in network traffic analysis (i.e., network forensics), assess potential threats, conduct research into advanced anti-forensics techniques, provide incident handling surge support, and provide thorough and detailed reporting - as requested - on these activities.
Daily activities for this job include:
Performing remote and local forensic imaging of a variety of media, computer systems, operating systems, etc., in a forensically sound manner
Extracting forensic artifacts from images and performing in-depth analysis in support of rtx soc, cert, mcot, etc.
Researching threats, vulnerabilities, and exploits
Develop custom scripts to automate analysis and tasks
Participating in large scale cyber investigations
Supporting cyber operations teams including the soc, intel, threat hunting, and incident response teams
Required skills & experience:
7+ years of experience in information security and incident response
5+ years of experience in forensic imaging & analysis
5+ years of experience with both commercial and open-source, local and enterprise, individual and collaboration forensic imaging and analysis tools (i.e., encase forensic & endpoint investigator, ftk and ad lab, axiom, x-ways, forensic explorer, autopsy, siftkit, plaso, etc.)
Experience with mobile device forensics using commercial and open-source tools (cellebrite ufed4pc, inspector and digital collector, xry and xamn, oxygen, etc)
In-depth understanding of windows/linux artifact and log analysis
Extensive knowledge of security concepts and techniques
Understands basic cloud computing, security and forensics, including how and where data is stored, acquisition methods for analysis, etc.
Solid understanding of windows security domain environment and artifacts
Solid understanding of computer malware, exploits, and current attacker tools, techniques and procedures
Comfortable with forensic acquisition and analysis of non-standard devices such as network appliances, special test/operational equipment, iot
Knowledge of networking (tcp / ip, topology, and security), operating systems (windows / unix), and web technologies (internet security).
Excellent understanding of microsoft windows architecture, file systems, and core applications.
Excellent technical writing skills as well as providing succinct executive summaries
Desired skills, knowledge and experience:
Familiarity with encryption / decryption algorithms and technologies
Solid understanding of networking protocols and network traffic analysis
Experience with log analysis, incident response, threat intelligence, and / or security research
Comfortable with both windows and linux shells and utilities
Timeline analysis based on multiple data sources
Ability to manipulate large volume of data for analysis using siem, database, log tool, scripting, etc.
Experience as a systems administrator (windows / unix)
Understanding of computer malware, exploits, and ethical hacking techniques with windows, unix, and web technologies
Good understanding of windows domain architecture, tracking and remediation of threats within that environment
Experience with memory analysis using redline, volatility, or rekall
Working knowledge of yara and signature development
Good understanding of defense-in-depth and Apply Now it in the real world
Programming experience using python, go, c#, java, ruby, powershell, bash
Amazon web services (aws) or azure cloud architecture and management
Professional security certifications (cissp, ence, grem, gcfa, gcfe, gcia, ceh, security+, oscp, etc.)
Typically requires a university degree or equivalent experience and a minimum 10 years of experience, or an advanced degree and a minimum 7 years of experience.
This position requires the eligibility to obtain a u.sSecurity clearanceExcept in rare circumstances, only u.sCitizens are eligible for a security clearance.
Work authorization: us citizen or us green card holder required
Raytheon technologies is an equal opportunity/affirmative action employerAll qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class.
Posted 30+ days ago