Computer Security Specialist
Listed on 2026-02-15
-
IT/Tech
Cybersecurity, Systems Engineer, Information Security, IT Consultant
About the Role
At Raytheon, the foundation of everything we do is rooted in our values and a higher calling – to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today’s mission and stay ahead of tomorrow’s threat. Our team solves tough, meaningful problems that create a safer, more secure world.
Raytheon Technologies is currently seeking an experienced computer security candidate to join our talented team. The qualified candidate will be responsible for evaluating Looking for to join our team and perform technically challenging assignments, which will closely contribute to protecting our nation and our products. We are seeking a System Administrator / Cyber Security Engineer to function as a key contributor for the Integrated Platform Solutions engineering team.
As a member of the Integrated Platform Solutions team, we want you to develop solutions to secure the Warfighter’s technology advantage. Our team creates security solutions leveraging multiple disciplines and processes like Risk Management Framework (RMF) Assessment and Authorization (A&A), (Use the "Apply for this Job" box below). Software Assurance, Hardware Assurance, Cryptography, NSA High Assurance (Type
1) Certification and Supply Chain Risk Management (SCRM) to support Program Protection Implementation across major program(s).
Location:
Aurora, CO
- Assess current customer requirements; evaluating trends; developing security architecture and requirements, and design architecture artifacts, plans, and policies.
- Support and develop Risk Management Framework (RMF) assessment documentation and conduct controls validation testing resulting in the Authorization to Operate (ATO) decision.
- Collect, capture, report, and perform analysis on cybersecurity collected data and test results.
- Conduct cybersecurity audits to ensure appropriate implementation and continuous compliance of the security posture of the system.
- Assess and monitor system compliance, auditing, security plan development and delivering information systems security education and awareness.
- Conduct technical and administrative assessments.
- Integrate new cybersecurity processes, procedures, and tools.
- Support the creation, review and update of cybersecurity documentation and other technical writing.
- Stay up to date with the latest cybersecurity standards, regulations, and trends to identify updates required to Cybersecurity governance.
- Create and maintain guidance and best practices related to managing cyber risks (both hardware and software).
- Typically requires a University Degree or equivalent experience and minimum 8 years prior relevant experience.
- DOD 8570.01-M IASAE Level II or Level III Compliant Certification (e.g. Security+, CISSP, or equivalent).
- Experience with security features and/or vulnerability analysis of various operating systems.
- Experience in Risk Management Framework, IA certification, accreditation, IA controls and developing and maintaining associated documentation
- Experience with security systems engineering involving various computer hardware and software S/W operating system and application solutions in both a stand‑alone and in LAN/WAN configurations.
- Active and transferable U.S. government issued TS/SCI security clearance with C.I. polygraph security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance.
- Experience with cloud and/or virtualization technologies.
- Experience with IT and/or network and system security administration, including operating system security configuration and account administration best practices for UNIX, MS Windows, Red Hat Enterprise Linux, and CISCO Systems.
- Experience with various information system security tools that address vulnerability analysis and mitigation. These may include Splunk, Forcepoint, Ivanti, Tenable, ACAS, HBSS, etc.
- Experience with large multi‑facility networks including various complex components, including Windows and Linux environments.
- Experience in the following…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).