Northrop Grumman, Cyber Intelligence Division, Information Systems Sector is seeking a Cyber Intelligence Analyst, Level 4, to work in Andover, MA. There will be no relocation assistance offered for this position.
Northrop Grumman's Intelligence and Response (I&R) team, is tasked with a unique cyber mission to provide counterintelligence (CI) and cyber threat protection to Northrop Grumman's intellectual property, networks and sensitive data against a variety of highly skilled adversaries. To accomplish this goal, the I&R team performs daily in-depth analysis of current and future threat activity trends, monitors CI portals and liaisons with peers, to enhance the protection of the Northrop Grumman Global Network (NGGN). Currently, I&R is looking for an experienced and highly motivated problem solver to act as a senior network analyst and incident responder to process and mitigate threat actor activity as part of a high performing, high profile team of information security and CI professionals. Adaptability, creativity, a commitment to mission, self-direction, and strong written/verbal communication skills are essential.
The candidate will collaborate daily with various I&R team members and Strategic CI analysts to coordinate a multi-tiered approach to incident mitigation which will result in the denial of current and future adversary actions. The person chosen for this position will be tasked with identifying and countering sophisticated and varying information security threats across the NGGN.
Duties will include: Analytical triage and prioritization of concurrent incidents, host and network based log analysis, correlation of network indicators and PCAP data, incident timeline generation, and root cause analysis. The incumbent will be required to independently generate customized scripts to facilitate his/her analysis and prepare detailed written analyses of incidents. Additionally, they will often be required to brief their findings to both technical and non-technical senior management audiences.
** Occasional (< 10%) extended shift work and travel associated with conferences and meetings will be required.
Qualifications
Minimum Skills and Qualifications:
- Bachelors degree, equivalent in a Computer Science/Engineering related field; with 9 years of experience or 13 years of practical work related experience in lieu of degree;
- Must be a US Citizen and be able to obtain/maintain a security clearance (Secret/Top Secret);
- 9-13 years of experience in an analytical role focused primarily on network forensic analysis; experience working on a cross-functional or geographically dispersed team is a plus;
- Minimum 6 years of experience with Perl, Python, or other scripting language in an incident handling environment;
- Expertise in analysis of network communication protocols at all layers of the OSI model.
- Minimum 6 years of experience conducting analysis of electronic media, log data, and network devices in support of intrusion analysis or enterprise level information security operations;
- Experience with two or more analysis tools used in a CSIRT or similar investigative environment;
- Excellent communication skills, both oral and written;
- Ability to exercise sound judgment when escalating issues and a demonstrated ability to communicate effectively with all levels of management both orally and in writing;
- Demonstrated awareness of current host and network vulnerabilities and exploits, advanced computer network exploitation methodologies and tools;
- Ability to think creatively about remediation and countermeasures to challenging information security threats.
- One or more of the following technical certifications (or equivalent) required: GIAC Certified Enterprise Defender (GCED); GIAC Certified Incident Handler (GCIH); GIAC Certified Intrusion Analyst (GCIA); GIAC Certified Forensic Analyst (GCFA); GIAC Reverse Engineering Malware (GREM); Certified Forensic Computer Examiner (CFCE); Additional vendor certifications (eg. EnCE, ACE, etc.) highly desired.
Desired Additional Qualifications:
- Previous experience performing Red/Blue Team activities a plus;
- Experience working with large data sets and high performance computing systems
- Experience with cyber threat intelligence methodologies;
- Linux/Unix and Windows proficiency, including shell (bash, powershell, etc) scripting;
- Familiarity with current information security threats facing US defense contractors or the US Government.
Northrop Grumman Corporation is a leading global security company whose 75,000 employees provide innovative systems, products, and solutions in aerospace, electronics, information systems and technical services to government and commercial customers worldwide.
Northrop Grumman is an Equal Opportunity Employer committed to hiring and retaining a diverse workforce regardless of age. U.S. Citizenship is required for most positions.
|
|
|
||
|---|---|---|---|



















