This job listing has expired and the position may no longer be open for hire.

Senior Cyber Security Analyst at MIT Lincoln Laboratory in Lexington, Massachusetts

Posted in Other 30+ days ago.





Job Description:







Search by Keyword























O


Send me alerts every days

JOIN OUR TALENT NETWORK




form.emailsubscribe-form {
display: none;
}




O


Send me alerts every days









Senior Cyber Security Analyst



Apply now


Date: Sep 23, 2021



Location:

Lexington, MA, US


#job-location.job-location-inline {
display: inline;
}


Company:
MIT Lincoln Laboratory



Our Cyber Security Team monitors and protects Laboratory research from IT threats. The team operates a security operation center which looks at network traffic to find and eliminate threats from malware, spear fishing, and other attacks against the Lab. The team also looks for any vulnerabilities in our current environment and helps identify and develop solutions to mitigate these risks.


Job Description


The Security Analyst IV is responsible for performing operational support for network defenses, risk analysis on cyberthreats, security alerts, systems of interest, and other suspicious system or network activity. The Security Analyst IV is part of the Information Services Department (ISD) Cyber Security team. The Cyber Security team is actively involved with health and configuration management of security tools and works closely with the other teams within ISD Cyber Security from the start to closure of an incident as well as other teams within ISD. Through knowledge of network defenses data analysis, the Security Analyst identifies methods to mitigate future risk to networked systems. Also as part of the Cyber Security Team the Security Analyst assists in the evaluation and testing of security tools and devices.


Primary Duties


Cyber Security Documentation


  • Collaborate with Security / Risk team and Information Service Sectors to compile documentation and actions needed for audits

  • Document processes and procedures to demonstrate compliance.

Cyber Threat Analysis & Assessment

Rapid assessment and determination of active threats.


  • Perform threat analysis on suspicious messages to determine if spam, phishing and or a targeted email.

  • Analyze attachments and URL links for malicious content

  • Investigate sensor detections and alerts to determine severity of threat or false positive.

  • Through log and data analysis determine scope or extent at which other systems were exposed to the same threat.

  • Coordinate efforts among analyst to enhance mitigation efforts and avoid duplication of efforts.

  • Coordinate with Security Services Department on threat impact, nature and potential scope.

  • Identify, implement or request solutions (e.g. blocks) to mitigate future risk to the Laboratory.

  • Perform Data and System of Interest AV scans

Knowledge and Experience with Cyber Security in Cloud (AWS, Azure, etc) and DevSecOps


  • Infrastructure as code

  • Scripting





Primary Duties cont.


External Awareness


  • Research current malicious cyber activity at large.

  • Research how vulnerabilities are being exploited and software affected.

  • Proactively identify opportunities to mitigate potential threats based on research.

  • Proactively identify any patterns within device and server logs based on research to potentially identify systems of interest through log analysis.

Security Projects


  • Evaluate potential security software, tools or devices

  • Test new network security systems and changes to existing network security devices.

  • Develop technical project plans, requirement documentation, test plans, change requests, and communications to users.


    This position is under general supervision of the Threat Team Lead.

    This position does not have any financial responsibility. However technical expertise may be required for assisting with product selection and annual product support renewals.


    This position will maintain frequent contact with internal department and/or Laboratory user community as well as external vendors to maintain communications related to problem resolution, systems upgrades, services and product research. This position interacts frequently with the Security Services Department to maintain communication related to data recovery for forensics analysis based on request, and identification of policy violations, systems of interest putting the network at risk, threats of interest or messages of interest.


Qualifications


Knowledge and Skills:


  • CompTIA Security+ Certification or equivalent.

  • Working knowledge of security tools and devices including SIEM and SOAR tools.

  • Working knowledge Cyber Security in Cloud / DevSecOps including scripting (Python preferred)

  • An understanding of TCP/IP network protocols and application layer protocols (e.g., HTTP, SMTP, DNS, etc.)

  • Analyze log data for signs of malicious activity and create detections and/or alerts.

  • Good understanding of Windows, Mac and Linux Operating Systems and Event logging.

  • Ability to work independently toward delivery of goals as well as collaborate in team efforts.

  • Skill in interviewing users to determine source of potential malware or suspicious activity.

  • Excellent customer service skills.

  • Excellent verbal and written communication skills.

Preferred:


  • Bachelor's Degree in Computer Science, Information Technologies, Engineering or equivalent experience.

  • SANS GCIH (GAIC Certified Incident Handler) or equivalent, which would include solid working knowledge of incident handling.

  • Skill in organizing and managing projects.

  • Skill in building consensus among stakeholders and colleagues.

Experience:

6+ years' experience in various cyber security / SOC roles.


Additional Information


Ability to obtain and maintain a government security clearance.

Occasional off-hour/on-call support is necessary. A certain degree of flexibility of schedule is required as some work (planned/unplanned) must be done outside of major production hours during pre-scheduled maintenance windows.

This position requires and individual with excellent communication (both oral and written) and organizational skills. The individual must be able to work in a fast-paced environment at times with minimal supervision and execute operations, project and administrative tasks with a high degree of quality, while following existing processes and establishing new operational procedures and best practices where necessary. Additionally, the position requires the ability to work with members of other teams and staff to accomplish department and organizational goals.


For Benefits Information, click http://hrweb.mit.edu/benefits

Selected candidate will be subject to a pre-employment background investigation and must be able to obtain and maintain a Secret level DoD security clearance.

To safeguard our health and well-being, MIT Lincoln Laboratory requires COVID-19 vaccination for all employees. Individuals may request exemption from the vaccine requirement for medical or religious reason.

MIT Lincoln Laboratory is an Equal Employment Opportunity (EEO) employer. All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, age, veteran status, disability status, or genetic information; U.S. citizenship is required.

Requisition ID: 35405






Nearest Major Market: Boston




Job Segment:
Engineer, Cyber Security, Network Security, Computer Science, Security, Engineering, Technology






Apply now






Find similar jobs:





More jobs in Lexington, Massachusetts

Other
about 4 hours ago

The Judge Group Inc.
Other
1 day ago

Massachusetts General Hospital(MGH)
Other
1 day ago

HireMinds
More jobs in Other

Other
8 minutes ago

Kforce Inc
Other
8 minutes ago

Kforce Inc
Other
8 minutes ago

Kforce Inc