Raytheon

Pentetration Tester - SME

Posted on: 7 Mar 2021

Rosslyn, VA

Job Description

RIS has an immediate job opening for a Cyber Penetration Tester to support a U.S. Federal Agency contract to enable mission accomplishment by performing autonomous penetration testing to ensure appropriate security controls and safeguards are in place and function as intended for the designated systems. The penetration test are conducted in accordance with NSA INFOSEC Assessment Methodology (IAM) and INFOSEC Evaluation Methodology (IEM), and includes discovery activities, attack planning, test follow through, and detailed reporting on test scenarios, findings, and recommendations. Identify current and emerging threat trends, threat actors using a variety of cyber threat intelligence sources. Provide technical assessments of cyber threat actor use of cyber vulnerabilities, exploits, payloads, access infrastructures, and mission platforms. Conduct all-source research on cyber threat actors and intrusion sets (e.g., APTs); evaluate both technical and Intel reporting for cyber threat activities of interest. Conduct detailed analysis of incidents, threats, vulnerabilities, tactics, techniques and procedures (TTP), and other malicious and non-malicious indicators.

Work Location: Rosslyn, VA

Job Description: Conducts network or software vulnerability assessments and penetration testing utilizing reverse engineering techniques. Perform vulnerability analysis and exploitation of applications, operating systems or networks. Identifies intrusion or incident path and method. Isolates, blocks or removes threat access. Evaluates system security configurations. Evaluates findings and performs root cause analysis. Performs analysis of complex software systems to resolve both functionality and intent of software systems. Resolves highly complex malware and intrusion issues. Contributes to the design, development and implementation of countermeasures, system integration, and instruments specific to Cyber and Information Operations. May prepare and presents technical reports and briefings. May perform documentation, vetting and utilizing identified vulnerabilities for operational use.

Job Responsibilities:
Shall perform activities including:
Develop and maintain a multi-year schedule for penetration testing activities
Interface and coordinate with 3rd party organizations performing penetration testing for DS/CTS/CMO
Interface and coordinate with system owners to establish targets for testing, test schedule, test goals, and rules of engagement
Lead efforts that document and design improvement strategies for discovered vulnerabilities and monitoring gaps
When authorized, exploit known vulnerabilities against Department systems in a controlled manner to ensure Department defenses can detect exploitation
Plan and coordinate Department participation in support of each specific penetration test
Design, perform and report on penetration testing of systems to satisfy the NIST 800-53 CA-8 security control and using methodologies that may include, NIST SP 800-115, Penetration Testing Execution Standard (PTES), and Information Systems Security Assessment Framework (ISSAF)
Produce reports and conduct administration briefings on test activities, scenarios, results and recommendations
Stay abreast of current attack vectors and unique methods for exploitation of computer networks
Develop unique exploit code and attack vectors to conduct penetration tests
Render expertise and guidance to other cyber security programs regarding intrusion methods

Required Skills:
Experience with network intrusion detection and response operations (Protect, Defend, Respond and Sustain methodology)
Experience in the detection, response, mitigation, and/or reporting of cyber threats affecting client networks and one or more of the following:
Experience in computer intrusion analysis and incident response
Working knowledge of Intrusion detection/protection systems
Knowledge and understanding of network devices, multiple operating systems, and secure architectures
Working knowledge of network protocols and common services
System log analysis
Experience responding to and resolving situations caused by network attacks
Ability to assess information of network threats (scans, computer viruses or complex attacks)
Perform information technology security research to remain current on emerging technology trends and develop exploits for disclosed and undisclosed vulnerabilities
Contributes to developing and implementing instruments for penetration testing and early warning of weaknesses or possible incidents building on methodologies as promulgated by NIST, ISO, etc. to ensure useful, measurable, and repeatable methods applied to quantifying risk
Selects, installs, and configures security testing platforms and resources or develop instruments and procedures for penetration tests
Performs penetration testing using standard penetration resources (Metasploit, Nmap, Nessus, Burp Suite, etc.)
SIEM content Analysis, Development and Testing
Experience with SIEMS (such as NetWitness, Splunk, SumoLogic, QRadar)
Experience with EDR solutions (Carbon Black, Crowdstrike, FireEye, SentinelOne)
Familiarity with packet analysis to include: HTTP Headers & Status codes, SMTP Traffic & Status codes, FTP Traffic & Status Codes
Practical experience of integration of COTS or open source instruments
Excellent communication skills
Personality traits: Naturally curious and inquisitive nature; perseverant and hardworking; loves solving problems and puzzles; critically rigorous; uncompromising integrity
Demonstrated ability to document processes
Proficiency with MS Office
Must be able to work collaboratively across teams and physical locations
Willing to work rotating shifts

Required Certifications:
Possess at least one certification, such as:
Certified Information Systems Security Professional (CISSP)
GIAC Penetration Tester (GPEN)
GIAC Certified Incident Handler (GCIH)
GIAC Network Forensic Analyst (GNFA)
GIAC Intrusion Analyst (GCIA)

Desired Skills:
Prior experience working in any of the following: Security Operations Center (SOC); Network Operations Center (NOC); Computer Incident Response Team (CIRT)
Experience with RSA Netwitness, Splunk, FireEye NX, EX, HX, AX, Carbon Black Response, RSA Archer
Experience with firewalls, routers or antivirus appliances
Experience working on a 24x7x365 watch desk environment
Experience with industry standard help desk instruments
Knowledge of WAN/LAN concepts and technologies

Desired Certifications:
Possess at least one relevant certification, but not limited to the following:
GIAC Certified Enterprise Defender (GCED)
GIAC Security Expert (GSE)
Certified Information Security Manager (CISM)
Certified Ethical Hacker (CEH)
Global Industrial Cyber Security Professional (GICSP)
Certified SCADA Security Architect (CSSA)

Education:

BS Degree in Computer Science/Electrical Engineering, Engineering, Science or a related field. Must have a minimum of 14+ years experience or equivalent education and experience.

*Must have a current TS with the ability to obtain a TS/SCI clearance

*Occasional travel within CONUS and OCONUS is expected

165683

Raytheon

Waltham, MA

Raytheon Company develops integrated products, services, and solutions for the defense and other government markets worldwide. It operates through five segments: Integrated Defense Systems (IDS); Intelligence, Information and Services (IIS); Missile Systems (MS); Space and Airborne Systems (SAS); and Forcepoint. The IDS segment offers integrated air and missile defense; land-and sea-based radar solutions; command, control, communications, computers, cyber, and intelligence solutions; naval combat and ship electronic and sensing systems; and undersea sensing and effects solutions.

The IIS segment provides technical and professional services, such as navigation, DoD space and weather solutions, cybersecurity, analytics, training, logistics, mission support, software-based systems, automation and sustainment solutions, and air traffic management systems, as well as intelligence, surveillance, and reconnaissance solutions. The MS segment develops and supports weapon systems comprising missiles, smart munitions, close-in weapon systems, projectiles, kinetic kill vehicles, directed energy effectors, and combat sensor solutions.

The SAS segment provides civil and military electro-optical/infrared sensors; airborne radars for surveillance and fire control applications; lasers; precision guidance systems; signals intelligence systems; processors; electronic warfare systems; tactical and strategic communications; and space-qualified systems. The Forcepoint segment offers cyber security products that include risk adaptive data loss prevention; user and entity behavior analytics and cloud access security broker capabilities; insider threat solutions; firewall technology; cloud and on premise Web and email security; and cross domain transfer products.

Raytheon Company has a strategic agreement with AirMap to collaborate on future projects to safely integrate drones into the national airspace system. The company was founded in 1922 and is headquartered in Waltham, Massachusetts.

Similar Jobs