Sr. InfoSec Operations Analyst

MITRE Corporation

Today
Secret
Unspecified
None
IT - Security
Bedford, MA (On-Site/Office)

Why choose between doing meaningful work and having a fulfilling life? At MITRE, you can have both. That's because MITRE people are committed to tackling our nation's toughest challenges-and we're committed to the long-term well-being of our employees. MITRE is different from most technology companies. We are a not-for-profit corporation chartered to work for the public interest, with no commercial conflicts to influence what we do. The R&D centers we operate for the government create lasting impact in fields as diverse as cybersecurity, healthcare, aviation, defense, and enterprise transformation. We're making a difference every day-working for a safer, healthier, and more secure nation and world. Our workplace reflects our values. We offer competitive benefits, exceptional professional development opportunities, and a culture of innovation that embraces diversity, inclusion, flexibility, collaboration, and career growth. If this sounds like the choice you want to make, then choose MITRE-and make a difference with us.

MITRE's Information Security department seeks an Operations Analyst to respond to and investigate cyber security incidents within the organization. This position offers a challenging opportunity to be exposed to a diverse set of security disciplines, including incident response, forensics, reverse engineering, malware analysis, intrusion detection, network security, and system security. MITRE has long been a source of cyber security innovation and continues to seek dedicated and talented individuals.

Roles & Responsibilities:
  • Respond to security alerts, investigate for signs of compromise and react accordingly.
  • Track and document security events and incidents in a ticketing system.
  • Analyze log data for signs of malicious activity in a SIEM.
  • Develop new analytics and apply mitigations for adversary Tactics, Techniques, and Procedures (TTPs).
  • Automate workflows in a SOAR tool.
  • Hunt for undetected indicators of compromise.
  • Develop new ways to use existing data to identify malicious activity.
  • Perform Incident Response actions such as forensics, memory analysis, etc.


Basic Qualifications:
  • Typically requires a minimum of 5 years of related experience with a Bachelor's degree; or 3 years and a Master's degree; or a PhD with relevant experience who can immediately contribute at this job step; or equivalent combination of related education and work experience.
  • Must be detail oriented and able to consistently follow incident investigation process.
  • Must have good analytical, written, verbal, and interpersonal communication skills.
  • Must be able to work well as part of a team and be self-motivated to work on individual projects.
  • Must have prior experience with cloud monitoring and response or analytic development in at least one major cloud provider's environment (AWS, Azure, or GCP)
  • Must have prior hands-on experience analyzing and responding to cyber events, including network, endpoint, server and cloud.
  • Must have prior hands-on experience with threat hunting.
  • This position requires a minimum of 50% hybrid on-site.


Preferred Qualifications:
  • Applied knowledge of Cyber Security concepts.
  • Familiarity with Linux, Mac, and Windows Operating Systems.
  • An in-depth understanding of TCP/IP network protocols and application layer protocols (e.g., HTTP, SMTP, DNS, etc.).
  • Experience analyzing adversary tactics, techniques, and procedures (TTPs) and developing defenses and/or detections for them.
  • Scripting experience, preferably with Python.
  • Experience with Splunk or Elastic Search.
  • Hands-on cloud incident response experience.
  • Works well independently and with the team.
  • Technical leadership skills.
  • Solves complex problems.
  • Adaptability to new tools, architectures, and policies.
  • Prior experience with network, host, and memory forensics.


This requisition requires the candidate to have a minimum of the following clearance(s):
None

This requisition requires the hired candidate to have or obtain, within one year from the date of hire, the following clearance(s):
Secret

Work Location Type:
Hybrid

MITRE is proud to be an equal opportunity employer. MITRE recruits, employs, trains, compensates, and promotes regardless of age; ancestry; color; family medical or genetic information; gender identity and expression; marital, military, or veteran status; national and ethnic origin; physical or mental disability; political affiliation; pregnancy; race; religion; sex; sexual orientation; and any other protected characteristics. For further information please visit the Equal Employment Opportunity Commission website EEO is the Law Poster and Pay Transparency .

MITRE intends to maintain a website that is fully accessible to all individuals. If you are unable to search or apply for jobs and would like to request a reasonable accommodation for any part of MITRE's employment process, please email recruitinghelp@mitre.org .

Copyright © 2024, The MITRE Corporation. All rights reserved. MITRE is a registered trademark of The MITRE Corporation. Material on this site may be copied and distributed with permission only.
Benefits information may be found here
group id: 90688979

MITRE | Solving Problems for a Safer World

Find MITRE Corporation on Social Media
Network Employers (6)
C
Recruiter
J
Talent Advisor
S
Recruiter
J
Recruiter
M
Recruiter
About Us
MITRE’s mission-driven teams are dedicated to solving problems for a safer world. Through our public-private partnerships and federally funded R&D centers, we work across government and in partnership with industry to tackle challenges to the safety, stability, and well-being of our nation.

MITRE Corporation Jobs


Job Category
IT - Security
Clearance Level
Secret