Peraton
Senior Security Threat Analyst
Peraton, Fort Huachuca, Arizona, us, 85670
Responsibilities:
Responsibilities include, but are not limited to:
Identify and investigate vulnerabilities, asses exploit potential, and document findings and remedies for presentation to facilitate mitigations oncustomer systemsPerform daily cyber threat research and present findings to the organization to maintain knowledge of current adversary tactics, techniques andprocedures and how to apply them. Brief staff and leadership on these findingsEvaluate system security configurations, identify intrusion, identify incident method, and perform root cause analysis on intrusionsPerform analysis of complex software systems to determine both functionality and intent of software systemsResolve highly complex malware and intrusion issuesContribute to the design, development and implementation of countermeasures, system integration, and tools specific to Cyber and Information OperationsCreate analytics with a SIEM to identify patterns, anomalies, and compromising indicators to alert Cyber Incident respondersPrepare and presents technical reports and briefingsPerform documentation and vetting of identified vulnerabilities for operational useAssist all sections of the Defensive Cyber Operations team as required in performing analysisTravel to customer sites to perform network security evaluationsWrite reports of vulnerabilities to increase customer situational awareness and improve the customers cyber security postureQualifications:Basic Qualifications:
Active Top-Secret/SCIMinimum of 8 years with BS/BA; Minimum of 6 years with MS/MA; Minimum of 3 years with PhDCertified Ethical Hacker (CEH)GIAC Certified Intrusion Analyst (GCIA)Possess DoD 8570.01-M Information Assurance Technician (IAT) Level II Baseline CertificationMust posses an active, OR have the ability to obtain within 90 days of hire date, an ITIL Foundations CertificationMust have a full, complete, and in-depth understanding of all aspects of Defensive Cyber OperationsMust have a good breadth of knowledge of common ports and protocols of system and network servicesExperience in packet captures and analyzing a network packetExperience with intrusion detecti on systems such as Snort, Suricata, and ZeekExperience with SIEM systems such as Splunk, ArcSight, or ElasticDesired Qualifications:
DoD 8570 IAT III (CISSP, CASP, CISA, GCED, GCIH)Experience in developing complex dashboards, report, and automated searches in Splunk, ArcSight, or Elastic/KibanaExperience with analyzing packets using ArkimeExperience with Microsoft Windows event IDsExperience with Linux audit log analysisFamiliarity with Git and VScodeExperience with one or more scripting languages such as PowerShell, Bash, Python#FortHuachucaPeraton Overview:Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the cant be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how were keeping people around the world safe and secure.Target Salary Range:$146,000 - $234,000. This represents the typical salary range for this position based on experience and other factors.
Responsibilities include, but are not limited to:
Identify and investigate vulnerabilities, asses exploit potential, and document findings and remedies for presentation to facilitate mitigations oncustomer systemsPerform daily cyber threat research and present findings to the organization to maintain knowledge of current adversary tactics, techniques andprocedures and how to apply them. Brief staff and leadership on these findingsEvaluate system security configurations, identify intrusion, identify incident method, and perform root cause analysis on intrusionsPerform analysis of complex software systems to determine both functionality and intent of software systemsResolve highly complex malware and intrusion issuesContribute to the design, development and implementation of countermeasures, system integration, and tools specific to Cyber and Information OperationsCreate analytics with a SIEM to identify patterns, anomalies, and compromising indicators to alert Cyber Incident respondersPrepare and presents technical reports and briefingsPerform documentation and vetting of identified vulnerabilities for operational useAssist all sections of the Defensive Cyber Operations team as required in performing analysisTravel to customer sites to perform network security evaluationsWrite reports of vulnerabilities to increase customer situational awareness and improve the customers cyber security postureQualifications:Basic Qualifications:
Active Top-Secret/SCIMinimum of 8 years with BS/BA; Minimum of 6 years with MS/MA; Minimum of 3 years with PhDCertified Ethical Hacker (CEH)GIAC Certified Intrusion Analyst (GCIA)Possess DoD 8570.01-M Information Assurance Technician (IAT) Level II Baseline CertificationMust posses an active, OR have the ability to obtain within 90 days of hire date, an ITIL Foundations CertificationMust have a full, complete, and in-depth understanding of all aspects of Defensive Cyber OperationsMust have a good breadth of knowledge of common ports and protocols of system and network servicesExperience in packet captures and analyzing a network packetExperience with intrusion detecti on systems such as Snort, Suricata, and ZeekExperience with SIEM systems such as Splunk, ArcSight, or ElasticDesired Qualifications:
DoD 8570 IAT III (CISSP, CASP, CISA, GCED, GCIH)Experience in developing complex dashboards, report, and automated searches in Splunk, ArcSight, or Elastic/KibanaExperience with analyzing packets using ArkimeExperience with Microsoft Windows event IDsExperience with Linux audit log analysisFamiliarity with Git and VScodeExperience with one or more scripting languages such as PowerShell, Bash, Python#FortHuachucaPeraton Overview:Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the cant be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how were keeping people around the world safe and secure.Target Salary Range:$146,000 - $234,000. This represents the typical salary range for this position based on experience and other factors.