Date Posted: 2020-12-17-08:00Country: United States of AmericaLocation: UT2: 9 Farm Springs 9 Farm Springs, Farmington, CT, 06034 USARaytheon Technologies – Raytheon Technologies Corporation is an aerospace and defense company that provides advanced systems and services for commercial, military and government customers worldwide. It comprises four industry-leading businesses – Collins Aerospace Systems, Pratt & Whitney, Raytheon Intelligence & Space and Raytheon Missiles & Defense. Its 195,000 employees enable the company to operate at the edge of known science as they imagine and deliver solutions that push the boundaries in quantum physics, electric propulsion, directed energy, hypersonics, avionics and cybersecurity. The company, formed in 2020 through the combination of Raytheon Company and the United Technologies Corporation aerospace businesses, is headquartered in Waltham, Massachusetts. The utilizes internal processes and tools to detect and respond to various threats. Principal Responsibilities: Analyze and investigate ticketed events using various logs including firewalls, IDS/IPS, proxies, servers, endpoints and other network devices in an enterprise security information and event monitoring (SIEM). Recommend and initiate appropriate response activities using established event handling and incident response procedures based on risk categorization. Collaborate with peers and stakeholders across the Corporate and Business Unit cyber security and information technology organizations. Rotational, after-hours operational support (on-call). Perform other duties as assigned. Experience/Qualifications: Minimum 3 years experience desired working in Security Operations or Incident Response Excellent written and verbal communication skills; must be able to communicate technical details clearly and concisely with peers and all levels of management Capability to think and operate independently or in a team environment with minimal supervision A proactive. analytical and results driven mindset Highly detail oriented Strong background in process and procedure with the ability to develop, revise and execute standard work Organizational skills to manage multiple competing priorities and deadlines in a fast-paced working environment Proven ability to troubleshoot and solve technical issues Candidate must have technical experience in the following areas: Splunk or other SIEM Network analysis using tcpdump, Wireshark or other packet capture/inspection tools Searching, interpreting and working with data from enterprise logging systems including syslog, netflow and SIEM/SEIM platforms Scripting languages such as Python and PowerShell Automated Malware sandboxing Windows, macOS, and Linux operating systems Endpoint protection suites such as Symantec, McAfee, Carbon Black or Tanium. Systems or network architecture Threat research and analysis Host based forensics using EnCase, FTK or other digital forensics tools Education: 5 Years Experience with BS or BA Degree in a technical program desired Or Advanced Degree with 3 years experience desired Location: Farmington, CT Required Status: US Citizen or US Person required as work may involve visibility to ITAR related projects. Raytheon Technologies is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class. Privacy Policy and Terms: Click on this link to read the Policy and Terms Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, sex, sexual orientation, gender orientation, gender identity, national origin, disability, or protected Veteran status.