Advanced Cyber Unit Analyst
Listed on 2026-02-28
-
IT/Tech
Cybersecurity, Information Security, IT Consultant, Systems Analyst
Working Pattern: Full-time
Working
Location:
Indianapolis, IN or Remote
Job Title: Advanced Cyber Unit Analyst
Job DescriptionAs an Advanced Cyber Unit Analyst for Rolls‑Royce, you’ll play a key role in proactively identifying threat agents attacking or planning to attack the organization and quelling the risk at the earliest possible juncture. This is an exciting, newly created opportunity where you’ll work within a global team to detect, disrupt, and eradicate threat actors.
Why Rolls‑Royce?Rolls‑Royce is one of the most enduring and iconic brands in the world and has been at the forefront of innovation for over a century. We design, build and service systems that provide critical power to customers where safety and reliability are paramount. We are proud to be a force for progress, powering, protecting and connecting people everywhere. We want to ensure that the excellence and ingenuity that has shaped our history continues into our future and we need people like you to come and join us on this journey.
Rolls‑Royce has been recognized as the top employer in the Engineering & Manufacturing category on the prestigious Forbes Top Employers for Engineers list for 2025. Be part of a team that sets the industry standard and drives groundbreaking solutions. We are committed to creating a workplace where all employees feel respected, supported, and empowered to do their best work.
Rolls‑Royce is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to any protected characteristics.
What You Will Be Doing- Identify suspicious or anomalous activities by analyzing logs, packet captures and alerts from IDS/IPS, firewall, proxies, SIEMs and take appropriate action to resolve.
- Support the Rolls‑Royce SOCs in managing security incidents and escalating severe security incidents. Create comprehensive security write‑ups which articulate security analysis and remediation techniques.
- Conduct research and utilize various intelligence sources to maintain awareness and understanding of the current threat landscape and emerging security threats.
- Create comprehensive security assessments which articulate security issues, analysis and remediation techniques.
- Continuously seek to identify potential service / tool improvements which will enhance the delivered services.
- Identify who has attacked or is about to attack the organization by analyzing threat intelligence, evaluating threats and vulnerabilities and understanding threat actor’s modus operandi.
- Lead hunt exercises using threat intelligence, analysis of anomalous log data, brainstorming sessions and attack tree analysis to detect and eradicate threat actors.
- Suggest modifications to internal defences and processes for more effective and efficient security operations.
At Rolls‑Royce we put safety first, do the right thing, keep it simple and make a difference. These principles form the behaviours that guide us and are an essential component of our assessment process. They are the fundamental qualities that we seek for all roles.
Basic Requirements- Associate’s degree in Business, Engineering, Computer Science or Information Technology with 4+ years of experience in information technology security.
- Bachelor’s degree in Business, Engineering, Computer Science or Information Technology with 2+ years of experience in information technology security.
- Master’s degree in Business, Engineering, Computer Science or Information Technology.
- PhD in Business, Engineering, Computer Science or Information Technology.
- In lieu of a degree, must have 6+ years of experience in information technology security.
- To be eligible for consideration, you must be a U.S. Citizen.
- Experience as a SOC Security Analyst and familiarity with industry leading security products such as SIEMs and networking mapping, vulnerability scanning, and packet capture and data analytics tools.
- Experience of network anomaly detection using traffic analysis or network intruder detection systems.
- A basic understanding of the cyber kill chain in relation to Advanced Persistent Threats (APTs).
- Experience and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).