Peraton Overview Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our 22,000 employees do the cant be done, solving the most daunting challenges facing our customers.
Qualifications - Requires 2 to 5 years with BS/BA or 0 to 2 years with MS/MA/MBA or 8 to 10 years with no degree.
- Prior Cyber Threat Analysis experience
- Experience working within a Security or Network Operations Center
- Experience working with Security incident and event management
- Demonstrated proficiency in Windows and Linux environments
- Demonstrated experience with drafting reports, documenting case details, and able to summarize findings and recommendations based on system analysis
Desired- BS degree in Cybersecurity, Information Security, Information Technology, Computer Science/Engineering, Network Engineering, or Computer forensics
- Demonstrated proficiency with at least one of the following tools/techniques: Splunk Enterprise, FireEye, SolarWinds, Remedy, and/or McAfee ePolicy
- Relevant Certifications: Security +, CySA+, CASP+, CEH, CISSP, GCIA, Splunk Certified User
Responsibilities Conduct research and evaluate technical and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and customer information networks. Analyzes network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent. Prepares assessments and cyber threat profiles of current events based on the sophisticated collection, research and analysis of classified and open source information. Correlates threat data from various sources. Develops and maintains analytical procedures to meet changing requirements and ensure maximum operations. Collects data using a combination of standard intelligence methods and business processes. Produces high-quality papers, presentations, recommendations, and findings for senior US government intelligence and network operations officials.
- 12-hour Day Shift schedule on the Computer Incident Response Team (CIRT) Watch Floor
- 7 12-hour days over a two week period.
- Collaborate between CIRT elements as necessary during incident detection and response stages
- Respond promptly to all request for support whether telephonic, via e-mail or instant messenger
- Maintain incident case management database for all reported incidents
- Review incidents and events captured in the Jira after closure for investigative sufficiency and timeliness
- Research external information on events, incidents, outages, threats, and technical vulnerabilities
- Coordinate and disseminate the best course of action for the IC enterprise during cybersecurity events, incidents, outages, threats and technical vulnerabilities with IC-IRC fusion analysis team
- Assess incidents to identify type of attack, collect evidence, and assess impact
For Colorado Residents Colorado Salary Minimum: $55,660.80 Colorado Salary Maximum:$118,976.00 The estimate displayed represents the typical salary range for this position, and is just one component of Peraton's total compensation package for employees. Other rewards may include annual bonuses, short- and long-term incentives, and program-specific awards. In addition, Peraton provides a variety of benefits to employees.
Industry
Posted: 2021-06-28 Expires: 2023-10-01