Are you interested in expanding your career through experience and exposure, all the while supporting a mission that seeks to ensure the security of our nation and its allies If so, then Northrop Grumman may be the place for you. As a leading global security company providing innovative systems, products and solutions to customers worldwide, Northrop Grumman offers an extraordinary portfolio of capabilities and technologies. Here at Northrop Grumman we are comprised of professionals that bring different perspectives, are curious about the world, accepting of each other, and understand that the more ideas, backgrounds, and experiences we bring to our work then the more innovative we can be. As we continue to build our talented workforce we look for professionals that exemplify our core values, leadership characteristics, and approach to innovation.
Hours of Support provided include the following: 2:00 PM 10:30 PM (CST)
Roles and Responsibilities may include, but are not limited to:
Cyber Threat and Hunt Analyst determining if an event meets the criteria for additional cyber hunt investigation and/or constitutes a security incident subject to investigation and notify team lead or designate within 15 minutes.
Review audit logs and identify any unusual or suspect behavior.
Provide targeted attack detection and analysis, including the development of custom signatures and log queries and analytics for the identification of targeted attacks.
Develop and execute custom scripts to identify host-based indicators of compromise.
Implement new detection capabilities and improve upon existing security tools.
Determine scope of intrusion identifying the initial point of access or source.
Recommend remediation activities to secure the source or initial point of access of intrusion.
Provide cyber threat intelligence collection & correlation in coordination with a cyber-threat team.
Provide executive level cyber security strategic recommendations along with security engineering recommendations and custom solutions to counter adversarial activity
Provide advanced technical capabilities, including Big Data Analytics, and Predictive Intelligence.
Participate as an analyst point of presence during threat intelligence community exchanges.
Provide proactive APT hunting, incident response support, and advanced analytic capabilities.
Profile and track APT actors that pose a threat in coordination with threat intelligence support teams.
Support the incident response process by providing advanced analysis services when requested to include recommending containment and remediation processes, independent analysis of security events, and reporting of identified incidents to Incident Handling (IH).
Develop analytics to correlate IOCs and maximize threat detection capabilities based off defense analysis processes.
Create and disseminate summary reports, investigation reports, and threat briefs.