Security Analyst
Lexington, MA, US
MIT Lincoln Laboratory
Position Description
The Security Analyst III is responsible for performing operational support for network defenses, risk analysis on cyberthreats, security alerts, systems of interest, and other suspicious system or network activity. The Security Analyst II is part of the ISD Cyber Security Operations team. The Cyber Security Operations team is actively involved with health and configuration management of security tools and works closely with the other teams within ISD Cyber Security from the start to closure of an incident. Through knowledge of network defenses data analysis, the Security Analyst identifies methods to mitigate future risk to networked systems. Also as part of the Cyber Security Team the Security Analyst assists in the evaluation and testing of security tools and devices.
Primary Duties:
Cyber Security Operations
- Build and Administer Cyber protection tools to include creating and maintaining standard operating procedures (SOPs)
- Expand expertise in Cyber protection tools to become subject matter expert
- Ensure the Cyber protection tools are used to their fullest extent to protect the laboratory
Cyber Threat Analysis & Assessment
Rapid assessment and determination of active threats
- Perform threat analysis on suspicious messages to determine if spam, phishing and or a targeted email.
- Analyze attachments and URL links for malicious content
- Investigate sensor detections and alerts to determine severity of threat or false positive.
- Through log and data analysis determine scope or extent at which other systems were exposed to the same threat.
- Coordinate efforts among analyst to enhance mitigation efforts and avoid duplication of efforts.
- Coordinate with Security Services Department on threat impact, nature and potential scope.
- Identify, implement or request solutions (e.g. blocks) to mitigate future risk to the Laboratory.
- Perform Data and System of Interest AV scans
Knowledge and Experience with Cyber Security in Cloud (AWS, Azure, etc.) and DevSecOps
- Infrastructure as code
- Scripting
- External Awareness
- Research current malicious cyber activity at large.
- Research how vulnerabilities are being exploited and software affected.
- Proactively identify opportunities to mitigate potential threats based on research.
- Proactively identify any patterns within device and server logs based on research to potentially identify systems of interest through log analysis.
- Security Projects
- Evaluate potential security software, tools or devices
- Test new network security systems and changes to existing network security devices.
- Develop technical project plans, requirement documentation, test plans, change requests, and communications to users.
This position is under general supervision of the Operations Team Lead.
This position does not have any financial responsibility. However technical expertise may be required for assisting with product selection and annual product support renewals. This position will maintain frequent contact with internal department and/or Laboratory user community as well as external vendors to maintain communications related to problem resolution, systems upgrades, services and product research. This position interacts frequently with the Security Services Department to maintain communication related to data recovery for forensics analysis based on request, and identification of policy violations, systems of interest putting the network at risk, threats of interest or messages of interest.
QUALIFICATIONS
Knowledge and Skills
Required Minimum:
- CompTIA Security+ Certification or equivalent
- Working knowledge of security tools and devices including SIEM and SOAR tools
- Working knowledge Cyber Security in Cloud / DevSecOps including scripting (Python preferred)
- An understanding of TCP/IP network protocols and application layer protocols (e.g., HTTP, SMTP, DNS, etc.)
- Analyze log data for signs of malicious activity and create detections and/or alerts
- Good understanding of Windows, Mac and Linux Operating Systems and Event logging
- Ability to work independently toward delivery of goals as well as collaborate in team efforts
- Skill in interviewing users to determine source of potential malware or suspicious activity
- Excellent customer service skills
- Excellent verbal and written communication skills
Preferred:
- Bachelor’s Degree in Computer Science, Information Technologies, Engineering or equivalent experience
- SANS GCIH (GAIC Certified Incident Handler) or equivalent, which would include solid working knowledge of incident handling
- Skill in organizing and managing projects
- Skill in building consensus among stakeholders and colleagues
Experience:
- 4+ years’ experience in various cyber security / SOC roles
Additional Information
Ability to obtain and maintain a government security clearance.
Occasional off-hour/on-call support is necessary. A certain degree of flexibility of schedule is required as some work (planned/unplanned) must be done outside of major production hours during pre-scheduled maintenance windows.
This position requires and individual with excellent communication (both oral and written) and organizational skills. The individual must be able to work in a fast-paced environment at times with minimal supervision and execute operations, project and administrative tasks with a high degree of quality, while following existing processes and establishing new operational procedures and best practices where necessary. Additionally, the position requires the ability to work with members of other teams and staff to accomplish department and organizational goals.
At MIT Lincoln Laboratory, our exceptional career opportunities include many outstanding benefits to help you stay healthy, feel supported, and enjoy a fulfilling work-life balance. Benefits offered to employees include:
- Comprehensive health, dental, and vision plans
- MIT-funded pension
- Matching 401K
- Paid leave (including vacation, sick, parental, military, etc.)
- Tuition reimbursement and continuing education programs
- Mentorship programs
- A range of work-life balance options
- ... and much more!
Please visit our Benefits page for more information. As an employee of MIT, you can also take advantage of other voluntary benefits, discounts and perks.
Selected candidate will be subject to a pre-employment background investigation and must be able to obtain and maintain a Secret level DoD security clearance.
MIT Lincoln Laboratory is an Equal Employment Opportunity (EEO) employer. All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, age, veteran status, disability status, or genetic information; U.S. citizenship is required.
Requisition ID: 41253
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: AWS Azure Clearance Cloud CompTIA Computer Science DevSecOps DNS DoD Forensics GCIH Linux Log analysis Malware Network security Python Risk analysis SANS Scripting Security Clearance SIEM SMTP SOAR SOC TCP/IP Vulnerabilities Windows
Perks/benefits: Health care Parental leave
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.