Intelligence Analyst

Job Locations US-MD-Fort Meade
Requisition ID
Position Category
Cyber Security
Top Secret/SCI w/Poly
Cyber Mission


This is an exciting new program and our Intelligence Analysts will have the opportunity to:

  • Be responsible for the overall collection of operational and logistical data for assigned UAS at assigned location.
  • Verify all data for accuracy, make appropriate changes to improve the accuracy, and transmit the data via established timelines and procedures.
  • Acts as focal point for quality control from other sites, runs edits, corrects errors, and responds to customer contract requirements.
  • Collects operational and logistical data on all assigned UAS platforms at your assigned location.
  • Participates as a team member performing threat analyses based on knowledge on electronic warfare/intelligence systems and concept.
  • Contributes to development of analytical threat models and provides functional guidance and direction to threat studies team in overall conduct of project(s).
  • Supports team performing expert-level research and analysis of intelligence and related data support of threat studies. Provides advice, guidance, and direction to threat studies team.
  • Supports team providing other technical services such as computer software system design/development, installation and integration planning, testing, and support of a wide range of systems that support intelligence functions.
  • Meets with corporate and customer representatives project team members to facilitate and coordinate study activities.
  • Conducts project briefings to assess study progress and to ensure consistency in meeting study objective.
  • Participates in and manages the preparation of proposals in response to RFPs from potential customers.
  • Assists other corporate representatives in related proposal development.
  • Prepares, submits, and presents reports and issue papers to customer representatives.


Basic Qualifications:

  • TS/SCI with polygraph.
  • Individual should meet DODM 8570.01 IAT Level II position requirements
  • Associate degree or higher in Computer Science, Cyber Security, Information Technology, Software Engineering, Information Systems, or Computer Engineering from an accredited college or university and 2 years of experience in the field and CASP+, CCSP, Cloud+, or CLSSP certifications OR 4 years of experience as a Threat Analyst with experience in either Host analysis or Network analysis managing SIEM or SOAR platforms such as Elastic, Splunk, Sentinel or other open-source or government provided solutions OR 4 years of experience in Offensive Cyber Operations as an Exploitation Analyst. OR 4 years of experience in the SIGINT community as a Target Digital Network Analyst or Digital Network Exploitation Analyst
  • Detailed knowledge of threat/war doctrine and concepts and threat forces.
  • Knowledge of advanced threat analysis technology in such areas as telecommunications, computer science, electronic warfare and/or nuclear/biological, or chemical warfare.
  • Detailed knowledge of Department of Defense and service level (Army, Navy, Air Force) intelligence communities, including collection methods and production resources and responsibilities.
  • Skills and abilities in supervising the handling classified information.
  • Working knowledge with military order of battle, chain of command and communications/information security.
  • Strong knowledge of technology related to electronic warfare.

Demonstrated Experience in at least 3 of the following:

  • Correlation of data from multiple sources, including host, network, user, and intelligence reports to uncover threats.
  • Collection, aggregation, and interpretation of log data from various sources.
  • Configuration, management, and optimization of Network Intrusion Detection Systems and Host-based Intrusion Detection Systems to include fine-tuning security rule sets for tools such as Suricata, Snort, Yara, and Sigma.
  • Deep packet inspection and identification of malicious traffic using packet analysis tools, such as Wireshark or Network Miner.
  • Threat hunting to identify advanced persistent threats and zero-day vulnerabilities using various threat hunting methodologies


Peraton Overview

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit to learn how we’re keeping people around the world safe and secure.

Target Salary Range

$112,000 - $179,000. This represents the typical salary range for this position based on experience and other factors.


Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed