Create Email Alert

ⓘ There was an unexpected error processing your request.

Please refresh the page and try again.

If the problem persists, please contact us with your issue.

Email address is already registered

You can always manage your preferences and update your interests to ensure you receive the most relevant opportunities.

Would you like to [visit your alert settings] now?

Success! You're now signed up for Job Alerts

Get ready to discover your next great opportunity.

Similar Jobs

  • Rocket Software

    Security Analyst

    Watertown, MA, United States

    It's fun to work in a company where people truly BELIEVE in what they're doing! Job Description Summary: As a Security Analyst with Rocket Software, you are part of a global, fast-paced IT organization with a primary mission to provide world class service to the software development labs and internal departments, ensuring our employees have acces

    Job Source: Rocket Software
  • Kyyba

    Security Analyst

    Boston, MA, United States

    • Ending Soon

    Duties and Responsibilities This individual will: Define the organization's asset inventory and Develop and maintain an Asset Inventory for all hardware, software, virtual machines and devices that includes identification of owners and criticality/risk ratings Work across teams to incorporate data from other tools to enhance the asset inventory En

    Job Source: Kyyba
  • VBeyond Corporation

    Security Analyst

    boston, ma

    Hi Job Seekers, Hope you are doing great!! Currently, we have a job opening of Cyber Security Analyst at Boston MA with our client. If you are interested, then please reply to me with your updated resume or please call me at 9086332106 Cyber Security Analyst Boston MA 12+ Months QUALIFICATIONS – Bachelor’s degree in computer science, Cybersecur

    Job Source: VBeyond Corporation
  • Emerson Hospital

    IT Security Analyst I

    Concord, MA, United States

    IT Security Analyst I Job Ref: 29269 Category: Information Technology Location: Emerson Hospital, 133 Old Road to Nine Acre Corner, Concord, MA 01742 Department: I.S. / Telecom Schedule: Full Time Shift: Day shift Hours: 8:00am-4:30p As a key member of the Information Security team the IT Security Analyst I will provide security opera

    Job Source: Emerson Hospital
  • Kyyba

    Security Analyst

    Boston, MA, United States

    Duties and Responsibilities This individual will: Define the organization's asset inventory and Develop and maintain an Asset Inventory for all hardware, software, virtual machines and devices that includes identification of owners and criticality/risk ratings Work across teams to incorporate data from other tools to enhance the asset inventory En

    Job Source: Kyyba
  • Emerson Hospital

    IT Security Analyst I

    Concord, MA, United States

    IT Security Analyst I Job Ref: 29269 Category: Information Technology Location: Emerson Hospital, 133 Old Road to Nine Acre Corner, Concord, MA 01742 Department: I.S. / Telecom Schedule: Full Time Shift: Day shift Hours: 8:00am-4:30p As a key member of the Information Security team the IT Security Analyst I will provide security opera

    Job Source: Emerson Hospital
  • Rocket Software

    Security Analyst

    Waltham, MA, United States

    It's fun to work in a company where people truly BELIEVE in what they're doing! Job Description Summary: As a Security Analyst with Rocket Software, you are part of a global, fast-paced IT organization with a primary mission to provide world class service to the software development labs and internal departments, ensuring our employees have acces

    Job Source: Rocket Software
  • Wolters Kluwer

    Security and Compliance Analyst

    Boston, MA, United States

    • Ending Soon

    Security Risk and Compliance Analyst will operate within a divisional security team reporting to the Director of Information Security. Analyst will be responsible for risk assessment, reporting and audit of Customer facing applications supporting the Tax and Accounting (TAA) and Corporate Performance (CP&ESG) application portfolio. Primary responsi

    Job Source: Wolters Kluwer

Security Analyst

Lexington, MA, United States

Position Description

The Security Analyst II is a member of the Threat Assessment Team which performs analysis on cyberthreats, research and develop new methods for detecting cyber threats, reviews and triages security alerts, and other suspicious system or network activity. The Threat Assessment Team is actively involved with security incident handling and works closely with the Security Services Department from the start to the closure of an incident. Through data analysis, the Security Analyst identifies methods to mitigate future risk to networked systems. The Security Analyst researches external malicious cyberactivity to proactively identify ways to mitigate risk to the network. Also as part of the Information Technology Security Team the Security Analyst assists in the evaluation and testing of security tools and devices.

Adversary Detection

Research and develop ever changing methods to detect and alert on possible threat activity

Obtain Intelligence on developing actor TTP's

Identify ways to mitigate future risk to the Laboratory and request blocks to be put in place

Analyze samples from suspect systems or emails for further Indicators of Compromise

Cyber Threat Analysis & Assessment

Rapid assessment and determination of active threats

Perform threat analysis on suspicious messages to determine if spam, phishing and or a targeted email

Investigate sensor detections and alerts to determine severity of threat or false positive

Through log and data analysis determine scope or extent at which other systems were exposed to the same threat

Coordinate efforts among analyst to enhance mitigation efforts and avoid duplication of efforts

Coordinate with Security Services Department on threat impact, nature and potential scope

Publish detailed Threat Assessment reports as required

Identify, implement or request solutions (e.g. blocks) to mitigate future risk to the Laboratory

External Awareness

Research current malicious cyber activity at large

Research how vulnerabilities are being exploited and software affected

Proactively identify opportunities to mitigate potential threats based on research

Proactively identify any patterns within device and server logs based on research to potentially identify systems of interest through log analysis

Security Projects

Evaluate potential security software, tools or devices

Test new network security systems and changes to existing network security devices

Develop technical project plans, requirement documentation, test plans, change requests, and communications to users

This position is under general supervision of the Threat Team Lead

This position does not have any financial responsibility. However technical expertise may be required for assisting with product selection and annual product support renewals

This position will maintain frequent contact with internal department and/or Laboratory user community as well as external vendors to maintain communications related to problem resolution, systems upgrades, services and product research

This position interacts frequently with the Security Services Department to maintain communication related to data recovery for forensics analysis based on request, and identification of policy violations, systems of interest putting the network at risk, threats of interest or messages of interest

Qualifications

Required Minimum:

CompTIA Security+ Certification or equivalent

An understanding of TCP/IP network protocols and application layer protocols (e.g., HTTP, SMTP, DNS, etc.)

Good understanding of Windows, Mac and Linux Operating Systems and Event logging

Strong working knowledge of security tools and devices including SIEM and SOAR tools

Previous experience in developing and implementing detection mechanisms

Working knowledge Cyber Security in Cloud / DevSecOps including scripting (Python preferred)

Scripting knowledge including use of APIs to perform integration with systems where possible

Previous experience developing and deploying cybersecurity solutions to popular cloud platforms

Previous experience analyzing network or system logs for malicious activity

Some experience in malware analysis and/or reverse engineering, as well as analyzing email attachments and URL links for malicious content

Previous experience developing automations and/or playbooks in SOAR environments for response and remediation

Knowledge of industry standards such as MITRE ATT&CK, Cyberthreat Kill Chain and NIST standards among others

Ability to work independently toward delivery of goals as well as collaborate in team efforts

Skill in interviewing users to determine source of potential malware or suspicious activity

Excellent customer service skills

Excellent verbal and written communication skills

Preferred

Bachelors Degree in Computer Science, Information Technologies, Engineering or equivalent experience

SANS GCIH (GIAC Certified Incident Handler) or equivalent, which would include solid working knowledge of incident handling

Skill in organizing and managing projects

Skill in building consensus among stakeholders and colleagues

Experience:

4+ years experience in various cyber security / SOC roles

Additional Information

Ability to obtain and maintain a government security clearance

Occasional off-hour/on-call support is necessary. A certain degree of flexibility of schedule is required as some work (planned/unplanned) must be done outside of major production hours during pre-scheduled maintenance windows

At MIT Lincoln Laboratory, our exceptional career opportunities include many outstanding benefits to help you stay healthy, feel supported, and enjoy a fulfilling work-life balance. Benefits offered to employees include:

Comprehensive health, dental, and vision plans

MIT-funded pension

Matching 401K

Paid leave (including vacation, sick, parental, military, etc.)

Tuition reimbursement and continuing education programs

Mentorship programs

A range of work-life balance options

... and much more!

Please visit our Benefits page (https://hr.mit.edu/benefits) for more information. As an employee of MIT, you can also take advantage of other voluntary benefits, discounts and perks (https://hr.mit.edu/benefits/additional) .

Selected candidate will be subject to a pre-employment background investigation and must be able to obtain and maintain a Secret level DoD security clearance.

MIT Lincoln Laboratory is an Equal Employment Opportunity (EEO) employer. All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, age, veteran status, disability status, or genetic information; U.S. citizenship is required.

Requisition ID: [[id]]

Apply

Create Email Alert

Create Email Alert

Security Analyst jobs in Lexington, MA, United States

ⓘ There was an unexpected error processing your request.

Please refresh the page and try again.

If the problem persists, please contact us with your issue.

Email address is already registered

You can always manage your preferences and update your interests to ensure you receive the most relevant opportunities.

Would you like to [visit your alert settings] now?

Success! You're now signed up for Job Alerts

Get ready to discover your next great opportunity.