Peraton is currently seeking an experienced Cyber Incident Handling Analyst to join our team in support of the U.S. Army Europe Regional Cyber Center (RCC-E).
Location: Wiesbaden, Germany.
In this role, you will:
- Monitor, analyze, and act on SIEM alerts and events to detect malicious activities across information systems and networks as part of a dedicated, rotating 24/7 incident response team to ensure continuous operational coverage.
- Work on first, second, or third shift on a rotation to accomplish the duties and responsibilities.
- Support dynamic cyber defense operations by coordinating security toolsets and adhering to the Department of Defense framework for measuring and quantifying cyber risk.
- Conduct threat and vulnerability analysis by evaluating network and host activity against baseline requirements, researching security standards, reviewing vulnerability findings related to SIEM alerts, and analyzing system logs for indicators of malicious intent.
- Manage incident response by documenting and classifying incidents (in accordance with Army and DoD regulations), determining root causes, coordinating remediation efforts, and performing post-intrusion analyses to identify detection gaps;
- Communicate effectively by providing timely incident updates and daily reports to higher headquarters and Defensive Cyber Operations staff, and by preparing visual charts, diagrams, and comprehensive reports to support metrics analysis and enhance cybersecurity posture.
- Optimize detection capabilities by developing specialized SIEM queries, tuning IDS/IPS rules to reduce false positives, and documenting identified vulnerabilities for operational integration.
- Provide team and customer support by assisting various sections of the Defensive Cyber Operations team and conducting in-depth network security evaluations at customer sites.
Advanced Analysis and Expert Responsibilities:
- Utilize SIEM technologies for advanced cyber forensics to detect and deter malicious actors targeting networked weapons platforms and U.S. DoD networks.
- Analyze host and network events to assess operational impact and advisory capabilities.
- Develop analytics based on indicators of compromise and perform forensic investigations by dissecting host data to determine the root causes, tactics, techniques, and tools used in cyber intrusions.
- Prepare high-quality strategic reports, presentations, and recommendations for senior U.S. government intelligence and network operations officials.