Responsibilities
Working as expert, conduct research and evaluate technical and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and US and DoD information networks. Analyzes network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent. Prepares assessments and cyber threat profiles of current events based on the sophisticated collection, research and analysis of classified and open source information. Correlates threat data from various sources. Develops and maintains analytical procedures to meet changing requirements and ensure maximum operations. Collects data using a combination of standard intelligence methods and business processes. Produces high-quality papers, presentations, recommendations, and findings for senior US government intelligence and network operations officials.
- Provides vulnerability and kill chain analysis of SCO designated systems.
- Researches systems to determine vulnerabilities in order to better enable DoD user freedom of operation within the applicable mission or operational domain.
- Monitor, analyze, and detect Cyber events and incidents within information systems and networks.
- Assist with integrated, dynamic Cyber Defense, coordinate and maintain security toolsets to support continuous monitoring and ongoing authorization programs, establish a framework by which cyber risk can be measured and quantified in the marketplace.
- Determines security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues; preparing cost estimates.
- Implements security systems by specifying intrusion detection methodologies and equipment; directing equipment and software installation and calibration; preparing preventive and reactive measures; creating, transmitting, and maintaining keys; providing technical support; completing documentation.
- Verifies security systems by developing and implementing test scripts.
- Maintains security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs.
- Ensure that the architecture and design of development and operational systems are functional and secure.
- This include designs for program of record systems and special purpose processing nodes with platform IT interconnectivity.
Qualifications
Required Qualifications:
- Bachelors Degree and 2+ years of related experience or Masters degree in relevant field.
- Active Top Secret clearance.
Preferred Qualifications:
- Experience with F2T2EA targeting.
- Experience writing intelligence reports.
- Knowledge of Boolean logic.
Peraton Overview
Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our employees do the can’t be done, solving the most daunting challenges facing our customers.
Salary Range
Salary Minimum: $40,000
Salary Mid: $80,000
Salary Maximum: $100,000
The estimate displayed represents the typical salary range for this position, and is just one component of Peraton’s total compensation package for employees. Other rewards may include annual bonuses, short- and long-term incentives, and program-specific awards. In addition, Peraton provides a variety of benefits to employees.
An Equal Opportunity Employer including Disability/Veteran.