Security Analyst

MIT Lincoln Laboratory
Lexington, MA, US
Full-time

Position Description

The Security Analyst II is a member of the Threat Assessment Team which performs analysis on cyberthreats, research and develop new methods for detecting cyber threats, reviews and triages security alerts, and other suspicious system or network activity.

The Threat Assessment Team is actively involved with security incident handling and works closely with the Security Services Department from the start to the closure of an incident.

Through data analysis, the Security Analyst identifies methods to mitigate future risk to networked systems. The Security Analyst researches external malicious cyberactivity to proactively identify ways to mitigate risk to the network.

Also as part of the Information Technology Security Team the Security Analyst assists in the evaluation and testing of security tools and devices.

Adversary Detection

  • Research and develop ever changing methods to detect and alert on possible threat activity
  • Obtain Intelligence on developing actor TTP's
  • Identify ways to mitigate future risk to the Laboratory and request blocks to be put in place
  • Analyze samples from suspect systems or emails for further Indicators of Compromise

Cyber Threat Analysis & Assessment

  • Rapid assessment and determination of active threats
  • Perform threat analysis on suspicious messages to determine if spam, phishing and or a targeted email
  • Investigate sensor detections and alerts to determine severity of threat or false positive
  • Through log and data analysis determine scope or extent at which other systems were exposed to the same threat
  • Coordinate efforts among analyst to enhance mitigation efforts and avoid duplication of efforts
  • Coordinate with Security Services Department on threat impact, nature and potential scope
  • Publish detailed Threat Assessment reports as required
  • Identify, implement or request solutions (e.g. blocks) to mitigate future risk to the Laboratory

External Awareness

  • Research current malicious cyber activity at large
  • Research how vulnerabilities are being exploited and software affected
  • Proactively identify opportunities to mitigate potential threats based on research
  • Proactively identify any patterns within device and server logs based on research to potentially identify systems of interest through log analysis

Security Projects

  • Evaluate potential security software, tools or devices
  • Test new network security systems and changes to existing network security devices
  • Develop technical project plans, requirement documentation, test plans, change requests, and communications to users
  • This position is under general supervision of the Threat Team Lead
  • This position does not have any financial responsibility. However technical expertise may be required for assisting with product selection and annual product support renewals
  • This position will maintain frequent contact with internal department and / or Laboratory user community as well as external vendors to maintain communications related to problem resolution, systems upgrades, services and product research
  • This position interacts frequently with the Security Services Department to maintain communication related to data recovery for forensics analysis based on request, and identification of policy violations, systems of interest putting the network at risk, threats of interest or messages of interest

Qualifications

Required Minimum :

  • CompTIA Security+ Certification or equivalent
  • An understanding of TCP / IP network protocols and application layer protocols (e.g., HTTP, SMTP, DNS, etc.)
  • Good understanding of Windows, Mac and Linux Operating Systems and Event logging
  • Strong working knowledge of security tools and devices including SIEM and SOAR tools
  • Previous experience in developing and implementing detection mechanisms
  • Working knowledge Cyber Security in Cloud / DevSecOps including scripting (Python preferred)
  • Scripting knowledge including use of APIs to perform integration with systems where possible
  • Previous experience developing and deploying cybersecurity solutions to popular cloud platforms
  • Previous experience analyzing network or system logs for malicious activity
  • Some experience in malware analysis and / or reverse engineering, as well as analyzing email attachments and URL links for malicious content
  • Previous experience developing automations and / or playbooks in SOAR environments for response and remediation
  • Knowledge of industry standards such as MITRE ATT&CK, Cyberthreat Kill Chain and NIST standards among others
  • Ability to work independently toward delivery of goals as well as collaborate in team efforts
  • Skill in interviewing users to determine source of potential malware or suspicious activity
  • Excellent customer service skills
  • Excellent verbal and written communication skills

Preferred

  • Bachelor’s Degree in Computer Science, Information Technologies, Engineering or equivalent experience
  • SANS GCIH (GIAC Certified Incident Handler) or equivalent, which would include solid working knowledge of incident handling
  • Skill in organizing and managing projects
  • Skill in building consensus among stakeholders and colleagues

Experience :

4+ years experience in various cyber security / SOC roles

Additional Information

  • Ability to obtain and maintain a government security clearance
  • Occasional off-hour / on-call support is necessary. A certain degree of flexibility of schedule is required as some work (planned / unplanned) must be done outside of major production hours during pre-scheduled maintenance windows

At MIT Lincoln Laboratory, our exceptional career opportunities include many outstanding benefits to help you stay healthy, feel supported, and enjoy a fulfilling work-life balance.

Benefits offered to employees include :

  • Comprehensive health, dental, and vision plans
  • MIT-funded pension
  • Matching 401K
  • Paid leave (including vacation, sick, parental, military, etc.)
  • Tuition reimbursement and continuing education programs
  • Mentorship programs
  • A range of work-life balance options
  • and much more!

Please visit our Benefits page for more information. As an employee of MIT, you can also take advantage of other voluntary benefits, discounts and perks .

Selected candidate will be subject to a pre-employment background investigation and must be able to obtain and maintain a Secret level DoD security clearance.

MIT Lincoln Laboratory is an Equal Employment Opportunity (EEO) employer. All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, age, veteran status, disability status, or genetic information;

U.S. citizenship is required.

Requisition ID : 41030

1 day ago
Related jobs
Mindlance
Boston, Massachusetts

The client is seeking a highly skilled and detail-oriented Information Security Analyst to join the Office of the Chief Information Security Office (CISO) team. The ideal candidate will be responsible for coordinating internal and external audits, performing comprehensive risk assessments and develo...

Analysis Group
Boston, Massachusetts

The Information Security Analyst will work with the Director of Information Security and Risk Management on the continuous improvement and development of the firm’s cybersecurity, compliance, and governance programs. Security Awareness and TrainingPartners with the stakeholders to improve security p...

MultiPlan
Bedford, Massachusetts
Remote

This role will support leadership in all aspects and leadership of vendor and risk management programs such as, audits, risk assessments, vendor management, policy management, and security awareness. Manage overall process to intake and respond to client security requests (i. Conduct information sec...

Vitamin T
Boston, Massachusetts

Conduct internal security assessments and provide guidance to address security gaps. Analyze security policies and procedures to determine weakness in infrastructure and security controls and make recommendations for remediation. Manage security endpoint protection tools and optimize configuration. ...

Athenahealth
Boston, Massachusetts

The Information Security group at athenahealth is looking for a security analyst to join our Cyber Security Operations Center (CSOC) team. IT security experience, with some exposure to information security (also known as cyber security). Completion of the Security+ certification, GIAC Certified Inci...

Bright Horizons
Boston, Massachusetts

Interacting with developers, analysts, security analysts, and technical and non-technical business teams to determine use cases and business processes for roles, entitlements, provisioning and de-provisioning. Bachelor's Degree in Information Security, Cyber Security, Information Assurance, Computer...

Comprehensive Resources INC
Boston, Massachusetts

Client: The Massachusetts Department of Transportation (MassDOT)<br /><br />Role: Cyber Security Operations Analyst<br /><br />Duration: 10 Months (Possible Extension)<br /><br />Location: 10 Park Plaza, 8th floor Boston, MA 02116<br /><br />Work Sched...

Mass General Brigham
Somerville, Massachusetts

Information Security Analyst III Vulnerability Remediation Program Lead-(3290329). The Mass General Brigham (MGB) Information Security Analyst III Vulnerability Remediation Lead will be critical in developing and implementing vulnerability remediation procedures and prioritization to protect our hos...

Commonwealth Financial Network
Waltham, Massachusetts

As a security operations analyst, you will be a key member of the Information Security Operations team. The security operations analyst will be a key member of our SOC team, responsible for monitoring, detecting, and responding to security threats and incidents. We’re looking for a security operatio...

ZoomInfo
Waltham, Massachusetts

As a key member of our Security Governance, Risk, and Compliance (GRC) team, the Security Analyst will play a pivotal role in safeguarding our company's data and infrastructure by managing 3 main domains: VRM, security certifications and attestations, and Customer RFP processes. Collaborating closel...