Home Jobs in UAE Lead Jobs in UAE Lead

Attack Surface Management (ASM) Lead Description at Raytheon

Raytheon

Posted on August 8, 2018

4 - 5 years Other - United Arab Emirates

Bachelor of Technology/Engineering(Computers). Any Nationality

Opening 01

Job Description

EMAIL JOB
Email sent successfully.

**This position is contingent based on contract award**
Are you the type of person that wants to start-up a new company in an exploding field? Raytheon has the opportunity for you. Cyber attacks are worldwide and countries/companies are looking for their partners in solving the challenging problems. Our ideal candidate is someone with great problem-solving skills, an outgoing and energetic personality, a high degree of creativity, innovation and out-of-the box thinking all with a mind for business!
Raytheon is seeking an Attack Surface Management (ASM) Lead for the design, development, integration and operations of a Security Operations Center (SOC) in Abu Dhabi, UAE in support of the identification of vulnerabilities on a large and complex enterprise network. The successful candidate will work closely with the information assurance and remediation management teams to identify vulnerabilities, disseminate reports and configure scans. The candidate must have proven performance delivering cyber products and technical services to the MENA region. This role will be responsible for ensuring the successful integration of cyber COTS products while working with subcontractors.
This assignment may require shift work and weekend work. All candidates must be able to work 2nd and 3rd shifts. All candidates must be able to work over the weekends.
Responsibilities will include:
• Function as a subject matter expert on vulnerability management.
• Ensure the program follows DevOps/Agile principles in the execution of the program
• Work with the CISO team to ensure that Security goals and policies are reflected by measurable and repeatable scans and vulnerability analysis.
• Serves as the lead resource for the identification of vulnerabilities to determine the effectiveness of system and network protections, along with policy compliance.
• Produce briefings/presentations and presents information to clients, internal stakeholders and/or leadership.
• Works with customer lead to ensure that vulnerability assessments measure policy and configuration compliance.
• Issues regular status on vulnerability assessment to customer lead using accurate and current data.
• Coordinates closely with customer to ensure that Security measurement methods are regularly reviewed and improved without losing the ability to track progress by observing change relative to prior measurements.
• Coordinates vulnerabilities with remediation management team
• Configures vulnerability scans and ensures the vulnerability report is disseminated in timely manner
• Assists with the selection of tools and methods for assessment as well as cost-effective mitigation
• Prepares clear and complete reports that provide remediation strategies.
• Provides follow-up on audits and remediation efforts.
Required Skills:
• Experience with large organization networks.
• Experience with regulatory compliance and policy enforcement.
• Experience defining legal boundaries for penetration tests.
• Experience with security testing tools like Core Impact and Tenable
• 4 year experience in the roles identified above.
• 6 8 years of Information Security experience.
• Excellent communication and interpersonal skills.
• Software development experience in C/C
• Expertise in scripting languages (e.g. Python, Ruby)
• Proficient in assembly languages (e.g. x86, ARM, MIPS)
• Highly knowledgeable in cybersecurity attack and defense technologies
• Strong foundations in computer architecture and operating systems
• Detailed experience in reverse engineering and vulnerability research
• Proficiency with disassemblers and debuggers (e.g. IDA Pro, GDB, WinDBG)
Desired Skills:
• Experience in DevOps/Agile practices and ITIL practices
• Experience planning, designing, and implementing and vulnerability scanning program
• Experience with large enterprise networks
• Experience with Tenable Nessus, WebInspect
• Familiarity with PE/ELF file formats, linkers, and compilers
• Experience solving Capture-the-Flag (CTF) challenges
• Experience developing and/or reversing Software Protection / Obfuscation techniques
• Strong understanding of and experience with cryptographic protocols
• Experience with automated testing and continuous integration tools/practices
• Experience developing hypervisors and virtualization utilities
• Embedded development or reverse engineering experience
Required Education:
• Bachelor s degree in Computer and Information Systems, Engineering, Science, or Mathematics or equivalent related experience may be considered in lieu of a degree.
Desired Certifications:
• DODI 8570.1-M Compliance at IAT Level II; CISSP, Certified Ethical Hacker (C|EH), SFCP, GCIA, SEC , Network , A , GSEC, GIAC, Splunk Power User
119948


Defence / Military / Government

Administration

Desired Candidate Profile

Experience with large organization networks.
• Experience with regulatory compliance and policy enforcement.
• Experience defining legal boundaries for penetration tests.
• Experience with security testing tools like Core Impact and Tenable
• 4 year experience in the roles identified above.
• 6 8 years of Information Security experience.
• Excellent communication and interpersonal skills.
• Software development experience in C/C
• Expertise in scripting languages (e.g. Python, Ruby)
• Proficient in assembly languages (e.g. x86, ARM, MIPS)
• Highly knowledgeable in cybersecurity attack and defense technologies
• Strong foundations in computer architecture and operating systems
• Detailed experience in reverse engineering and vulnerability research
• Proficiency with disassemblers and debuggers (e.g. IDA Pro, GDB, WinDBG)
Desired Skills:
• Experience in DevOps/Agile practices and ITIL practices
• Experience planning, designing, and implementing and vulnerability scanning program
• Experience with large enterprise networks
• Experience with Tenable Nessus, WebInspect
• Familiarity with PE/ELF file formats, linkers, and compilers
• Experience solving Capture-the-Flag (CTF) challenges
• Experience developing and/or reversing Software Protection / Obfuscation techniques
• Strong understanding of and experience with cryptographic protocols
• Experience with automated testing and continuous integration tools/practices
• Experience developing hypervisors and virtualization utilities
• Embedded development or reverse engineering experience
Required Education:
• Bachelor s degree in Computer and Information Systems, Engineering, Science, or Mathematics or equivalent related experience may be considered in lieu of a degree.
Desired Certifications:
• DODI 8570.1-M Compliance at IAT Level II; CISSP, Certified Ethical Hacker (C|EH), SFCP, GCIA, SEC , Network , A , GSEC, GIAC, Splunk Power User
119948","employmentType":"Professional Jobs","identifier":"119948BR","industry":" AbuDhabi","title":"Attack Surface Management (ASM) Lead","url":"https://jobs.raytheon.com/job/abu-dhabi/attack-surface-management-asm-lead/4679/8902705","hiringOrganization":{"@type":"Organization","name":"Intelligence, Information and Services"},"jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":" AbuDhabi","addressRegion":"","addressCountry":"United Arab Emirates ","streetAddress":"","postalCode":""}}}
DODI 8570.1-M Compliance at IAT Level II; CISSP, Certified Ethical Hacker (C|EH), SFCP, GCIA, SEC , Network , A , GSEC, GIAC, Splunk Power User
119948

Keywords

Python Agile Testing Tools Information Security Soc Ruby Virtualization X86 Mips Security Testing

REPORT THIS JOB

Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information.We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at abuse@naukrigulf.com

Raytheon

Founded in 1922, Raytheon is an international aerospace and defense company specializing in defense, civil government and cyber security solutions. It is headquartered in Waltham, Massachusetts, USA and operates globally. Being a technology and innovation leader, the company provides state-of-the -art electronics, mission systems integration, capabilities in the areas of sensing; effects; and command, control, communications and intelligence systems; as well as a broad range of mission support services.





The company has four businesses, namely:

• Integrated Defense Systems

• Intelligence, Information and Services

• Missile Systems

• Space and Airborne Systems





These businesses work together to offer excellent solutions to a variety of government and commercial customers. The company has a robust presence with its operations across the United Arab Emirates, Saudi Arabia, Kuwait, Qatar, Oman, Jordan, Egypt, Bahrain, etc.





Raytheon employs approximately 63,000 employees worldwide and has been named one of the best employers by Forbes Magazine. It offers a comprehensive and competitive benefits package and excellent growth opportunities to its employees.

More
View Contact Details
Additional Information Required

Employer has requested some additional information along with your application for this job

Login to Naukrigulf

Continue using

All your activity will remain private

or