VIEW
SAVED
JOBS

Senior Cyber Intelligence Analyst

2025-160246

CAtegory:

Intel and Threat Analysis

Clearance:

Top Secret/SCI with Poly

Location:

Linthicum
,
Maryland

Telecommute:

No remote/telework allowed
About Peraton

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.

Program Overview
About The Role

The Senior Cyber Intelligence Analyst will apply expert intelligence analysis skills to monitor, assess, and report on cyberspace operations, capabilities, vulnerabilities, and personalities that could pose a threat to DoD critical assets, the DoD Information Network (DoDIN), and Defense Industrial Base (DIB) networks. This role requires a deep understanding of adversary cyber threats, strong analytical abilities, and excellent communication skills. This position directly impacts current operations, as the successful candidate will prepare assessments and cyber threat profiles of current events based on sophisticated collection, research, and analysis of classified and Open-Source information. In this role you will also develop and maintain analytical procedures to meet changing requirements, underlining the urgency and significance of their work.

 

The ideal candidate will demonstrate proficiency in intelligence analysis techniques and experience analyzing threat data from various sources and network events, including researching and determining advisory capability and intent. You must have a strong understanding of cyber threats and threat actors, and be capable of working independently and as part of a team. You will also develop reports and briefing artifacts and may serve as a mentor to other mid-level analysts and junior staff, fostering a culture of learning and development.

Qualifications

Mandatory Qualifications:

  • Minimum 8 years with BS/BA, 6 years with MS/MA, 3 years with PhD. A degree from an ABET or NCAE-C accredited institution in one of the following fields is highly desired: Information Technology, Cybersecurity, Computer Science, Data Science, Information Systems, or Software Engineering.
  • Active TS/SCI with Poly eligibility.
  • Extensive experience in integrated cyber and business analysis, with advanced analytics and data science to support national security, criminal, cyber, and counterintelligence investigations and operations.
  • Expert-level proficiency using analytical tool suites common to the Intelligence Community and Cyber Threat Intelligence platforms (e.g., Splunk, Recorded Future, Virus Total, Flashpoint, Censys, Domain Tools, RiskIQ, Shodan).
  • Expert in MITRE ATT&CK framework for advanced threat analysis.
  • Demonstrated experience in gathering, analyzing, correlating, or evaluating information from various resources, including law enforcement databases, and supporting Law Enforcement/Counterintelligence (LE/CI) Operations and/or Cyberspace Operations.
  • Expert-level knowledge of network and application protocols, cyber vulnerabilities and exploitation techniques, and cyber threat/adversary methodologies (TTPs).
  • Expertise in building extended cybersecurity analytics.
  • Proven experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership.

Preferred Qualifications:

  • Fluency in either Russian, Japanese or Chinese Mandarin (desired but not required).
  • Joint Cyber Analysis Course (JCAC) graduate, or advanced degree in Cybersecurity.
  • Experience in intelligence-driven defense and/or Cyber–Kill Chain methodologies.
  • Possess current certifications such as IAM Level II & III, CSSP Analyst (Security+, CySA+, GICSP, GSEC, CND, CISSP, CASP+, GCIA, GCIH, GCFA, CEH), GIAC Open Source Intelligence (GOSI) Certification, or SANS SEC487 Open-Source Intelligence (OSINT) Gathering and Analysis course.
  • Possess a deep understanding of Cloud Security Architecture and related aspects of cybersecurity operations/analysis, including incident response and management, forensic media analysis, malware analysis/reverse-engineering, and cyber threat intelligence analysis.
SCA / Union / Intern Rate or Range

Details

Target Salary Range: $135,000 - $216,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual’s experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay.

EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.