Information Systems Technology Analyst
CAtegory:
Clearance:
Location:
Telecommute:
About Peraton
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees solve the most daunting challenges that our customers face. Visit peraton.com to learn how we’re keeping people around the world safe and secure.
Program Overview
About The Role
Peraton is seeking an Information Systems Technology Analyst in Bremerton, WA.
- Responsible for information systems design, development, and
analysis encompassing one or more of the following areas of technical expertise:
programming, PC application analysis, software development, systems integration, and related disciplines. - Manages the Information Technology (IT) infrastructure within an organization, including the physical network (e.g., LANs/WANs, servers, terminals) as well as server applications and software (e.g., PeopleSoft, Oracle).
- Configures, installs, maintains, and upgrades server applications and hardware.
- Evaluates, tests, recommends, coordinates, monitors, and maintains information systems (IS) and cyber security policies, procedures, and systems, including access management for hardware, firmware, and software.
- Ensures that IS and cyber security plans, controls, processes, standards, policies, and procedures are aligned with IS standards and overall IS and cyber security.
- Identifies security risks and exposures, determines the causes of security violations, and suggests procedures to halt future incidents and improve security.
- Develops techniques and procedures for conducting IS and cyber security risk assessments and compliance audits, the evaluation and testing of hardware, firmware, and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks, or leaks.
Qualifications
- Requires 2-5 years with BS/BA; 0 years with MS/MA; 6 years with no degree
- Requires an active TS/SCI level clearance
SCA / Union / Intern Rate or Range
Details
EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.