www.acad.jobs : academic jobs worldwide – and the best jobs in industry
                
     
Position: Cyber Incident Manager
Institution: Raytheon Company
Location: Arlington, Virginia, United States
Duties: Researching and compiling known resolution steps or workarounds to enable mitigation of potential Computer Network Defense incidents within the enterprise; Applying knowledge of the tactics, techniques, and procedures of various criminal, insider, hacktivist, and nation state threat actors to identify and validate threats; Applying cybersecurity concepts to the detection and defense of intrusions into small, and large-scale IT networks, and conduct cursory analysis of log data; Conducting cursory analysis of log data; Monitoring external data sources (e.g., Computer Network Defense vendor sites, Computer Emergency Response Teams (CERTs), SANS, Security Focus) to maintain currency of Computer Network Defense threat condition and determine which security issues may have an impact on the enterprise; Identifying the cause of an incident and recognizing the key elements to ask external entities when learning the background and potential infection vector of an incident
Requirements: BS Computer Science, Operations Management, Cybersecurity or related degree. Two years of related work experience may be substituted for each year of degree level education; U.S. Citizenship; Must have an active TS/SCI clearance; Must be able to obtain DHS Suitability; Must have 5 years of professional experience; 2+ years of directly relevant experience in cyber incident management or cybersecurity operations; Knowledge of incident response and handling methodologies
   
Text: Cyber Incident Manager Researching and compiling known resolution steps or workarounds to enable mitigation of potential Computer Network Defense incidents within the enterprise; Applying knowledge of the tactics, techniques, and procedures of various criminal, insider, hacktivist, and nation state threat actors to identify and validate threats; Applying cybersecurity concepts to the detection and defense of intrusions into small, and large-scale IT networks, and conduct cursory analysis of log data; Conducting cursory analysis of log data; Monitoring external data sources (e.g., Computer Network Defense vendor sites, Computer Emergency Response Teams (CERTs), SANS, Security Focus) to maintain currency of Computer Network Defense threat condition and determine which security issues may have an impact on the enterprise; Identifying the cause of an incident and recognizing the key elements to ask external entities when learning the background and potential infection vector of an incident BS Computer Science, Operations Management, Cybersecurity or related degree. Two years of related work experience may be substituted for each year of degree level education; U.S. Citizenship; Must have an active TS/SCI clearance; Must be able to obtain DHS Suitability; Must have 5 years of professional experience; 2+ years of directly relevant experience in cyber incident management or cybersecurity operations; Knowledge of incident response and handling methodologies
Please click here, if the job didn't load correctly.







Please wait. You are being redirected to the job in 3 seconds.