Home Jobs in UAE Lead Jobs in UAE Lead

Threat Detection Organization (TDO) Lead Description at Raytheon

Raytheon

Posted on August 10, 2018

4 - 5 years Other - United Arab Emirates

Any Graduation. Any Nationality

Opening 01

Job Description

EMAIL JOB
Email sent successfully.

**This position is contingent based on contract award**
Are you the type of person that wants to start-up a new company in an exploding field? Raytheon has the opportunity for you. Cyber attacks are worldwide and countries/companies are looking for their partners in solving the challenging problems. Our ideal candidate is someone with great problem-solving skills, an outgoing and energetic personality, a high degree of creativity, innovation and out-of-the box thinking all with a mind for business!
Job Description:
Raytheon is seeking a Threat Detection Organization (TDO) Lead for the design, development, integration and operations of a Security Operations Center (SOC) in Abu Dhabi, UAE. The candidate must have proven performance delivering cyber products and technical services to the MENA region. This role will be responsible for ensuring the successful integration of cyber COTS products while working with subcontractors.
This assignment may require shift work and weekend work. All candidates must be able to work 2nd and 3rd shifts. All candidates must be able to work over the weekends.
Responsibilities will include:
• Work closely with the Program Manager, Chief Engineer and Lead Integrator and/or Assistant SOC Manager to ensure technology, engineering resources, and planning allow the program to meet the current and future business requirements.
• Ensure the program follows DevOps/Agile principles in the execution of the program
• Maintain an understanding of the current vulnerabilities, response, and mitigation strategies used in cyber security operations
• Facilitate the customer's posturing itself to aggressively investigate cyber activity targeting customer and client information and its information infrastructure
• Assist in the education of staff on cyber threats and threat hunting methodology
• Maintaining proficiency in the use and production of visualization charts, link analysis diagrams, and database queries
• Analyze and report cyber threats as well as assist in deterring, identifying, monitoring, investigating and analyzing computer network intrusions.
• Provides insights to other team members on nuances of networking technologies, architectures, and network traffic analysis to support other analysts who do not have networking experience.
• Develops models for identifying incident-type activity, of malware or bad actors, using statistical analysis
• Develop dashboards to assist in automation and awareness for incident response and playbooks for automating investigations
• Reviews incident logs/records mining for evidence of malicious tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs)
• Researches Internet sources and threat intelligence databases to try and find evidence in customer logs
• Explores patterns in network and system activity through log correlation using Splunk and other tools
• Investigates evidence of threats against Windows, Linux, Database, Applications, web servers, firewalls or other relevant technologies
• Ingest IOC s to assess impact to organization
• Share IOC s with internal and external teams for validation and collaboration.
• Provide timely, accurate and relevant intelligence products to the customer to include a variety of intelligence reports, PowerPoint presentations, and various briefings.
• Leverage internal and external resources to research threats, vulnerabilities, and intelligence on various attackers and attack infrastructure
• On a rolling basis, use our hunting VDI solution to identify root cause, scope, and severity of each incident and compile findings into a finished analytical product Recommend tuning and instrumentation improvements to VSOC clients
• Work with our Threat Intelligence and Digital Forensics and Incident Response (DFIR) Teams to identify threats, develop or recommend countermeasures to our clients, and perform advanced network and host analysis in the event of a compromise
• Work with our Research and Development Team to improve and expand toolsets Receive training on and demonstrate competency in multiple NSM/SIEM platforms
• Interface with customers to consult with them on best security practices and help them mature their security posture
Required Skills:
• Demonstrated to advanced experience with computer networking and operating systems
• Experience with one of the following: Splunk, NetWitness, Arcsight, McAfee NSM, and other related tools
• Statistical modeling and analysis experience to infer possible cybersecurity threats
• Demonstrated to advanced experience of current threats, vulnerabilities, and attack trends
• Experience in analysis in investigations, such as in IT, law enforcement, military intelligence, or business analytics
• Interest in learning about Windows, Linux, Database, Application, Web server, firewall, SIEM etc. log analysis
• Verbal/written communication and interpersonal skills to effectively communicate with team-members
• Must be highly motivated with the ability to self-start, prioritize, multi-task and work in a team setting
• Understanding of intelligence cycle, Cyber Kill Chain, and Diamond Model
• Critical thinking and problem solving skills
• Possess good time management and written and oral communications skills
Desired Skills:
• Experience in Devops/Agile practices and ITIL practices
• Familiarity with common network vulnerability/penetration testing
• Experience evaluating systems and network devices and enterprise networks for IA vulnerabilities
• Experience evaluating enterprise networks for IA/security vulnerabilities
• Splunk query-development expertise
• Experience on an Incident Response team performing Tier I/II initial incident triage.
• Excellent writing skills
Desired Certifications:
• DODI 8570.1-M Compliance at IAT Level II; CISSP, Certified Ethical Hacker (C|EH), SFCP, GCIA, SEC , Network , A , GSEC, GIAC, Splunk Power User
Required Education:
• G10 requires 8 Years, with a B.S./B.A. in Engineering, Science, or Mathematics or 6 years with MS/MA in Engineering, Science or Mathematics or 4 years with PhD in Engineering, Science or Mathematics. Additional years of experience may be substituted in lieu of degree.
IIS Salary Grade G10
119959


Defence / Military / Government

Installation / Maintenance / Operations / Repair

Desired Candidate Profile

Demonstrated to advanced experience with computer networking and operating systems
• Experience with one of the following: Splunk, NetWitness, Arcsight, McAfee NSM, and other related tools
• Statistical modeling and analysis experience to infer possible cybersecurity threats
• Demonstrated to advanced experience of current threats, vulnerabilities, and attack trends
• Experience in analysis in investigations, such as in IT, law enforcement, military intelligence, or business analytics
• Interest in learning about Windows, Linux, Database, Application, Web server, firewall, SIEM etc. log analysis
• Verbal/written communication and interpersonal skills to effectively communicate with team-members
• Must be highly motivated with the ability to self-start, prioritize, multi-task and work in a team setting
• Understanding of intelligence cycle, Cyber Kill Chain, and Diamond Model
• Critical thinking and problem solving skills
• Possess good time management and written and oral communications skills
Desired Skills:
• Experience in Devops/Agile practices and ITIL practices
• Familiarity with common network vulnerability/penetration testing
• Experience evaluating systems and network devices and enterprise networks for IA vulnerabilities
• Experience evaluating enterprise networks for IA/security vulnerabilities
• Splunk query-development expertise
• Experience on an Incident Response team performing Tier I/II initial incident triage.
• Excellent writing skills
Desired Certifications:
• DODI 8570.1-M Compliance at IAT Level II; CISSP, Certified Ethical Hacker (C|EH), SFCP, GCIA, SEC , Network , A , GSEC, GIAC, Splunk Power User
Required Education:
• G10 requires 8 Years, with a B.S./B.A. in Engineering, Science, or Mathematics or 6 years with MS/MA in Engineering, Science or Mathematics or 4 years with PhD in Engineering, Science or Mathematics. Additional years of experience may be substituted in lieu of degree.
IIS Salary Grade G10
119959","employmentType":"Professional Jobs","identifier":"119959BR","industry":" AbuDhabi","title":"Threat Detection Organization (TDO) Lead","url":"https://jobs.raytheon.com/job/abu-dhabi/threat-detection-organization-tdo-lead/4679/8902704","hiringOrganization":{"@type":"Organization","name":"Intelligence, Information and Services"},"jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","addressLocality":" AbuDhabi","addressRegion":"","addressCountry":"United Arab Emirates ","streetAddress":"","postalCode":""}}}
IIS Salary Grade G10
119959

Keywords

Linux Windows Automation Firewall Agile Iis Soc Monitoring Penetration Testinginess Analytics

REPORT THIS JOB

Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information.We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at abuse@naukrigulf.com

Raytheon

Raytheon Intelligence, Information and Services delivers innovative technology to make the world a safer place. Our expertise in cyber, analytics and automation allow us to reach beyond what others think is possible to underpin national security and give our global customers unique solutions to solv e the most pressing modern challenges -- from the cyber domain to automated operations, and from intelligent transportation solutions to creating clear insight from large volumes of data. IIS operates at nearly 550 sites in 80 countries, and is headquartered in Dulles, Virginia. The business area generated $6.1 billion in 2017 revenues. As a global business, our leaders must have the ability to understand, embrace and operate in a multicultural world -- in the marketplace and the workplace. We strive to hire people who reflect our communities and embrace diversity and inclusion to advance our culture, develop our employees, and grow our business.
More
View Contact Details
Additional Information Required

Employer has requested some additional information along with your application for this job

Login to Naukrigulf

Continue using

All your activity will remain private

or