About Peraton
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees solve the most daunting challenges that our customers face. Visit peraton.com to learn how we’re keeping people around the world safe and secure.
About The Role
Peraton is seeking to hire an experienced Cyber Threat Analyst for its’ Federal Strategic Cyber division.
Location: Warrenton, VA.
In this role, you will:
- Research and analyze open source and classified reporting to identify current and emerging threat trends and work with cyber community and Intelligence Community partners to produce and offer threat intelligence products and briefings to internal and external partners and stakeholders.
- Document and report current and emerging threats that will exploit vulnerabilities of Department of Homeland Security stakeholders and to the Government.
- Communicate, coordinate, share information, and work closely with customer components.
- Document Indicators of Compromises and behaviors of new or high-impact tactics, techniques, and procedures (TTPs), used to infiltrate networks, systems, and assets.
- Develop informational and analytic products daily designed to increase situational awareness and advanced warning of current and emerging cybersecurity threats and risks.
- Report on underlying patterns of behavior by conducting detailed analysis of incidents, threats and risks and associated impacts and consequences, vulnerabilities, tactics, techniques, and procedures (TTP), and other malicious and non-malicious indicators.
- Develop operational-level trends analysis products that leverage customer internal data repositories, classified and unclassified open-source reporting to provide situational awareness of emerging cyber threat and risk trends to customer partners, stakeholders, and customers.
- Provide operational analysis coordination, research, and reporting support to the customer during internal cyber incident management exercises as well as national-level cyber exercises.
- Identify and leverage new threat-based frameworks and methodologies for analyzing adversaries’ activities based on network and system vulnerabilities, adversary tactics, techniques, and procedures (TTPs), (e.g., scanning, unsuccessful attempts, malware, phishing campaigns, privilege escalation, user and root-level intrusions, lateral movement, and data exfiltration).
- Enrich information within the Threat Indicator/Information Database to provide additional context to partial information sources and give additional information about specific IP addresses, DNS lookups and perform queries of other DHS systems or information repositories to pull additional information.
- Respond to requests for analysis and searches for corroborating, clarifying, or enhancing information or intelligence related to cyber threat activity.
- Evaluate reports of cyber threat activity by leveraging either the internally developed Threat Scoring Methodology (TSM) or the National Security Concern Score (NSCS).
- Produce weekly, monthly, quarterly, and annual performance metrics reports.
Qualifications
Minimum requirements:
- Bachelor's degree and minimum of 5 years of relevant experience; or Master’s degree and 3+ years; or a PhD and 2 years.
- An additional 4 years of experience will be considered in lieu of education/degree.
- Demonstrated work experience in Cyber Threat Analytics.
- Experience working in Cyber Intelligence requiring, at minimum, a moderate technical acumen.
- U.S. citizenship required.
- Active Public Trust is required.
- Willingness and ability to travel 10-25%.
Preferred Qualifications:
- Experience with Network Defense.
- Experience with MITRE Attack Framework.
- Experience with intrusion detection and prevention, incident response, log analysis and monitoring.
- Experience conducting Cyber Fusion Analysis.
- Experience with tools related to Vulnerability Scanning, Penetration Testing, Incident Management.
- Experience researching classified databases.
Details
Target Salary Range: $66,000 - $106,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual’s experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay.
Benefits Statement:
Peraton offers eligible employees a variety of benefits including medical, dental, vision, life, health savings account, short/long term disability, EAP, parental leave, 401(k), paid time off (PTO) for vacation, and company paid holidays. A full listing of available benefits can be viewed at <a href="https://www.careers.peraton.com/benefits" target="_blank" rel="noopener">https://www.careers.peraton.com/benefits.
Application Statements:
The application period for the job is estimated to be 30 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.
EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.