Peraton Overview Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our 22,000 employees do the cant be done, solving the most daunting challenges facing our customers.
We are an Equal Opportunity/Affirmative Action Employer. We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state, or local law.
As a government contractor, Peraton abides by the following provision
Pay Transparency Nondiscrimination ProvisionThe contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of the other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractors legal duty to furnish information. 41 CFR 60-1.35(c).
Qualifications Required:
- Requires 12 to 15 years with BS/BA or 10 to 13 years with MS/MA or 7 to 9 years with Ph.D.
- Proficiency with at least three (3) or more of the following: mobile security, telecom protocols, operating systems, reverse engineering, forensics, network analysis, vulnerability assessment, or malware detection/prevention.
- Experience drafting reports, documenting case details, summarizing findings, and providing recommendations based on analysis
- Demonstrated strong written and verbal communication skills
- Demonstrated strong customer and partner relationship building skills
- Demonstrated experience working on networking projects and demonstrated experience with cyber security, and/or network security principles
- Demonstrated experience with troubleshooting, investigating issues associated with IP network products including routers, switches, wireless networking, VPNs, IDS/IPS, Firewalls, IOT appliances
- Demonstrated experience with communication protocols such as IP, TCP, UDP, MPLS, OSPF, IGRP, BGP
- Knowledge and experience with encryption products, methodologies, configuration
- Knowledge and experience with network packet capture appliances/applications, such as Netwitness, Solera, Probe, wireshark, Snort, Zeek
- Knowledge and experience with network vulnerability scanners, web scanners, and database scaners, such as Nessus, WebInspect, AppDetective
- Experience with Network management products such as HPOpenview, Solarwind
- Experience with anonymous/privacy internet capabilities and supporting network architecture
- Experience using Splunk to analyze and triage proprietary networks
- Experience conducting or supporting technical investigative efforts
Desired:
- MS degree in Computer Science, Engineering, Computer Forensics, Network Security, or equivalent technical experience
- Experience ensuring quality assurance and implementing best practices
- Experience with Intrusion Prevention Systems and Endpoint Security Platforms
- Relevant Security Certification: CEH, CISSP, CCSP, CCFP, GCFA, GCIA, OSCP
Responsibilities Working as expert, conduct research and evaluate technical and all-source intelligence with specific emphasis on network operations and cyber security tactics, techniques, and procedures focused on the threat to networked platforms and customer information networks. Analyzes network events to determine the impact on current operations and conduct all-source research to determine capability and intent. Prepares assessments and cyber threat analysis of current events based on the sophisticated collection, research and analysis of classified and open source information. Correlates threat data from various sources. Develops and maintains analytical procedures to meet changing requirements and ensure maximum operations. Collects data using a combination of standard intelligence methods and business processes. Produces high-quality papers, presentations, recommendations, and findings for senior US government intelligence and network operations officials.
Seeking a Cyber Security Analyst to detect, analyze, and mitigate cyber threats. Specifically, the candidate will:
- Support cyber security initiatives through both predictive and reactive analysis, articulating emerging trends to leadership and staff
- Perform network traffic analysis of organizational systems to analyze raw packet data and identify anomalous behavior
- Prepare reports for customer on data analytics, emerging threats, high profile incidents, and proposed solutions
- Identify gaps in cybersecurity systems and processes to reduce organizational risks
- Offer innovative cyber defense solutions to protect customer systems