Conducts research and evaluates technical and all-source intelligence with specific emphasis on user behavior and patterns in a dynamic and changing mission environment. Detects anomalous activity in raw and processed log files for deeper exploration using IC tools and databases. Differentiates between general and targeted or suspicious scanning. Identifies trends cyber systems and performs behavior analysis. Uses Splunk dashboards to create alerts and investigate log files. Correlates threat data from various sources. Writes concise assessments that highlight findings supported by evidence, articulating the impact of conclusions.
Required Qualifications:
Desired Qualifications:
BS Equivalent = Minimum 4 years of experience in related technical field. Experience used as equivalency for college degree must be in addition to other experience requirements.
Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our employees do the can’t be done, solving the most daunting challenges facing our customers.
Software Powered by iCIMS
www.icims.com