RF Analyst Senior Technical Specialist
Peraton Overview Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our 22,000 employees do the cant be done, solving the most daunting challenges facing our customers.
Qualifications - Requires 12 to 15 years with BS/BA or 10 to 13 years with MS/MA or 7 to 9 years with Ph.D.
- Bachelors degree (or equivalent) in Cybersecurity, Information Technology (IT), Electrical Engineering (EE), Computer Science, Computer/Digital Forensics, Engineering, Math, Physics
- Demonstrated 16 years experience in three or more of the following: analysis, RF analysis, RF engineering, computer forensics, network engineering, networking security, penetration testing, red teaming, hardware engineering, software reverse engineering, computer exploitation.
- Proven proficiency with at least three (3) or more of the following: mobile security, telecom protocols, operating systems (Windows, iOS, Android, or Linux), reverse engineering, forensics, network analysis, vulnerability assessment or malware forensics.
- Demonstrated familiarity with Wireshark, Fiddler, EnCase, Sleuthkit and/or other forensic tools
- Demonstrated familiarization with waveform engineering and analysis
- Demonstrated familiarity with RF testing and RF analysis
- Demonstrated experience in drafting reports, documenting case details, and able to summarize findings and recommendations based on system analysis.
- Demonstrated experience in performing post-incident computer forensics while maintaining proper chain of custody and without destruction of critical data.
Desired Qualifications:- Experience within Intelligence Community (IC)
- Experience employing advanced forensic tools and techniques for attack reconstruction, including dead system analysis and volatile data collection and analysis
- Law Enforcement/Cyber Forensics experience
- Desired experience ensuring quality assurance and the spreading of best practices
- Relevant Certifications: CCFP, GCIA, OSCP, CEH, CISSP, or Security+
- Publications in peer-reviewed journal
Responsibilities he candidate will provide analyst expertise support to a United States Government (USG) customer and will be an active contributing member of a security vulnerability and computer forensic analysis team. The candidate will provide Radio Frequency (RF) expertise to a United States Government (USG) customer and will be an active contributing member of a RF security vulnerability and analysis team. The candidate must be able to provide trending and pattern analysis support and will be responsible for reviewing operational traffic, researching unclassified and classified data sets, preparing target packages, and providing briefings and products for senior USG officers. In addition, the candidate will provide guidance, case management, and support to field collection operations. The candidate must exercise excellent social acumen and operational judgment and be able to respond quickly to high priority tasking. The candidate must understand the importance of using tradecraft to minimize exposure. The candidate should have a comfort level with speaking as s/he may be required to brief assessments at various forums across the Intelligence Community. Furthermore, the ideal candidate will:
- Conduct RF testing, forensics, and analysis using commercial-off-the-shelf (COTS) and/or customer provided tools,
- Support cyber security initiatives through both predictive and reactive analysis, articulating emerging trends to leadership and staff.
- Provide management with discrepancy reports and end user documentation.
- Communicate daily with program managers, management, customer representatives, and end users to ensure delivery of quality products.
Furthermore, the ideal candidate will have:
Generally- Conduct computer forensics, RF, and security vulnerability analysis using commercial-off-the-shelf (COTS) and/or customer provided tools,
- Evaluate waveforms, cloud services, web applications, and commercial-off-the-shelf software and hardware,
- Perform web service network traffic analysis and waveform analysis to detect anomalies,
- Support cyber security initiatives through both predictive and reactive analysis,
- Articulate emerging trends to leadership and staff,
- Provide management with discrepancy reports and end user documentation.
- Communicate daily with program managers, management, customer representatives, and end users to ensure delivery of quality products.
Waveform & RF Device Analysis- Identify vulnerabilities in waveform design
- Develop and execute test scenarios that exploit these vulnerabilities using RF measurement equipment, commercial threat receivers and post processing/computing techniques
- Identify CI signal/signature anomalies in waveform design
- Identify radio hardware implementation anomalies that may adversely affect RF signature
- Measure signature diversity across different waveforms and different configurations of the same waveform
- All of above will require high proficiency in
- Tools like Mat lab & Python scripting.
- Usage of RF measurement and survey systems
- Experience in development of RF platforms, electrical hardware design and RF waveform design
Signals Analysis- Analyze regional RF signal environments to track technology usage trends
- Analyze regional RF signal environments to optimize RF deployments with waveform configurations that reduce probability of signal detection and identification
- Correlate RF configuration characteristics across diverse SIGINT datastreams to assess environmental suitability for waveform configurations
- Outline risk of detection, identification and geolocation of waveforms using terrestrial and overhead SIGINT threat testing and intelligence reports
- All of above will require high proficiency in
- Usage of RF measurement and survey systems
- Analyzing binary data streams from RF signals to extract data
- Calculating RF signal parameters based on external characteristics
Industry
Posted: 2021-06-29 Expires: 2023-06-07