Overview
The DHSâs Hunt and Incident Response Team (HIRT) secures the Nationâs cyber and communications infrastructure. HIRT provides DHSâs front line response for cyber incidents and proactively hunting for malicious cyber activity. Raytheon Technologies (RTX), as a prime contractor to DHS, performs HIRT investigations to develop a preliminary diagnosis of the severity of breaches. RTX provides HIRT remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based and network-based cybersecurity analysis capabilities. Raytheon Intelligence & Space (RIS) is seeking a Host Based Systems Manager to support this critical customer mission. Responsibilities: – Leading and coordinating forensic teams in preliminary investigations, – Planning, coordinating and directing the inventory, examination and comprehensive technical analysis of computer related evidence, – Distilling analytic findings into executive summaries and in-depth technical reports, – Serving as technical forensics liaison to stakeholders and explaining investigation details to include forensic methodologies and protocols, – Tracking and documenting on-site incident response activities and provides updates to leadership throughout the engagement – Evaluates, extracts and analyzes suspected malicious code. – Assisting Federal leads with overseeing and leading forensic teams at onsite engagements by coordinating evidence collection operations, – Providing technical assistance on digital evidence matters and forensic investigative techniques to appropriate personnel when necessary, – Supporting peer reviews and providing quality assurance reviews for junior personnel, – Overseeing forensic analysis and mentoring/providing guidance to others on data collection, analysis and reporting in support of onsite engagements. – Leads a technical team of up to 9 highly skilled network based systems analysts Required Skills: – U.S. Citizenship – Must have an active TS/SCI clearance – Must be able to obtain DHS Suitability – 8 years of directly relevant experience in cyber forensic investigations – Experience with malware reverse engineering – Experience with network security – Experience with vulnerability scanning/assessment – Experience with writing cyber investigative reports – Experience with the analysis and characterization of cyber attacks – Knowledge of system and application security threats and vulnerabilities – Demonstrated experience with the analysis of systems and networks, to include creating trust levels of critical resources – Experience with proper evidence handing procedures and chain of custody protocols – Must be able to work collaboratively across physical locations Desired Skills: – Experience with the following tool sets – EnCase – FTK – SIFT – X-Ways – Volatility – WireShark – Sleuth Kit/Autopsy – GRR – Experience with conducting all-source research Required Education: BS Computer Science, Computer Engineering, Computer Information Systems, Computer Systems Engineering or related degree. Two years of related work experience may be substituted for each year of degree level education. Desired Certifications: – GCFA, GCFE, EnCE, CCE CFCE, CISSP HIRTRIS 165684 Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, sex, sexual orientation, gender orientation, gender identity, national origin, disability, or protected Veteran status.