Job Listings

Here are our current job openings. Please click on the job title for more information, and apply from that page if you are interested.

 

Click here to view telework/hybrid opportunities.

 

Click here for full remote opportunities.

Use this form to perform another job search

The system cannot access your location for 1 of 2 reasons:
  1. Permission to access your location has been denied. Please reload the page and allow the browser to access your location information.
  2. Your location information has yet to be received. Please wait a moment then hit [Search] again.
Click column header to sort

Search Results Page 2 of 6

Job Locations US-MD-Fort Meade
Requisition Post Information* : Posted Date 1 week ago(4/15/2024 3:25 PM)
Peraton is actively seeking a Sensor Operations Systems Engineer to enhance our Cyber Mission team in Jessup, MD. This role is vital for someone eager to contribute to one of the most significant engineering contracts across the Intelligence Community. Offering a dynamic full-time opportunity, this position demands 1880 hours annually, primarily stationed at a designated customer site. As an integral part of our team, the successful candidate will play a pivotal role in systems engineering, offering program planning and mission management support to the SIGINT sensor operations.   Responsibilities include crafting initial Concept of Operations documents, developing task schedules, and overseeing program development and planning for our engineering and integration team. Additionally, the role entails rigorous project management - from requirement gathering, technical and programmatic analysis, to proposing alternative solutions and schedules for government review.   The chosen candidate will also explore and evaluate emerging technologies, liaising with vendors to deliver well-informed recommendations to our government clients. A key aspect of the role involves facilitating the transition of legacy systems to a unified sensor and data operations framework, ensuring comprehensive systems requirements alignment. You'll also keep abreast of related sensor efforts within the organization, identifying synergies and opportunities to enhance program efficiency.   Ultimately, you will serve as a vital advisor to the government customer on matters concerning project procurement, system integration, sustainment, and testing. This role not only requires technical acumen but also a strategic mindset to address both technical and resource-related advisories. Join us at Peraton to drive success in our projects and deliver unparalleled support to our prestigious clients in the Intelligence Community.
Requisition ID
2024-145705
Telecommute Options
No remote/telework allowed
Job Locations US-MD-Beltsville
Requisition Post Information* : Posted Date 1 week ago(4/16/2024 7:55 AM)
Peraton is seeking an experienced Principal Cyber Data Engineer with Splunk, UNIX, Network experience to become part of Peraton’s Department of State (DoS) Diplomatic Security Cyber Mission (DSCM) program providing leading cyber and technology security experience to enable innovative, effective and secure business processes.     Location: Beltsville, MD. First 90-days, on-site; Hybrid upon approval by the customer & the program.   - Work hours - work needs to be performed between 7:00 AM and 5:00 PM, EST; when on-site, requirement to be on-site by 9:00 AM, EST.    In this role, you will: - Support the Cyber Analytics team by being a SME on Splunk's Enterprise Security. - Provide SME input for future-state solutions pertaining to cyber analytics, XDR, and cloud data management. - Manage the administration of a growing 15 TB/day on-premises Splunk deployment, including both operating system and application aspects. - Integrate new data sources and technologies into Splunk Enterprise using the Common Information Model (CIM). - Onboard data by directly editing Splunk configuration files, utilizing RegEx skills as needed. - Troubleshoot log feeds by effectively communicating with external departments in an enterprise environment. - Apply upgrades and patches as necessary to maintain system security and compliance. - Assist cyber analysts in solving complex big data search processing challenges using expert SPL knowledge. - Support Splunk Enterprise Security and Ansible.  
Requisition ID
2024-145699
Telecommute Options
Flexible for occasional telework
Job Locations US-DC-Washington
Requisition Post Information* : Posted Date 2 weeks ago(4/11/2024 9:48 AM)
We are hiring a  Theatre Mission Planning Center(TMPC) Field Service Engineer to support our customer site at the Washington Planning Center (WPC) in the Washington Navy Yard, DC.   You will be working directly with the customer onsite in Washington DC.      This is a broad range Field Service Engineer that will provide expertise with the configuration, maintenance, and troubleshooting of Microsoft/Linux OS: Windows 10, Server 2016/2019, RedHat 7.x/8.x/9.x In support of the Theater Mission Planning Center (TMPC) products developed by Peraton.    What you'll do:   - Troubleshoot and diagnose system/software issues - Maintain systems with software and security updates - Support system upgrades/installations - Support cyber security accreditation of Theatre Mission Planning Center(TMPC) - Investigate and report software discrepancies - Support test events and other related customer requirements
Requisition ID
2024-145698
Telecommute Options
No remote/telework allowed
Job Locations US-MD-Fort Meade
Requisition Post Information* : Posted Date 7 days ago(4/18/2024 9:32 AM)
Peraton is hiring a Performance Integrity Process Engineer, to join our Cyber Mission business unit in Jessup, MD. As a Process Engineer on our team, you will support one of the largest enterprise-wide engineering contracts within the Intelligence Community. This is a full-time position requiring 1880 hours of support per year; and work is performed at a customer location. As a Mission Management Process Engineer on our team, you will provide process improvement (PI), engineering methodologies, and principles to effectively improve and align Enterprise-level processes. You will facilitate project teams in accomplishing project activities and objectives; and coordinate the transfer of new processes and practices to project teams by providing group facilitation, interviewing, training, and additional forms of knowledge transfer. You will also Act as a key coordinator between multiple project teams to ensure Enterprise-wide integration of engineering efforts. In addition: - Develop the plans for process assessments. - Work closely with the project team members to determine organizational readiness for assessment as well as in conducting assessments. - Coordinate and schedule process assessments. - Lead assessment teams in conducting both formal and informal assessments. - Analyze assessment results and make improvement recommendations. - Lead Process Improvement effort utilizing CMM/CMI or other similar process models. - Interpret and promote the use of Process Improvement best practices. - Ensure processes are established and documented to support the application and institutionalization of sound systems engineering discipline and continuous process improvement.
Requisition ID
2024-145693
Telecommute Options
No remote/telework allowed
Job Locations US-MD-Beltsville
Requisition Post Information* : Posted Date 1 week ago(4/15/2024 11:39 AM)
Peraton is currently seeking a Cyber Incident Handler that will become part of Peratons’ Department of State (DoS) Diplomatic Security Cyber Mission (DSCM) program providing leading cyber and technology security experience to enable innovative, effective, and secure business processes.  The DSCM program encompasses technical, engineering, data analytics, cyber security, management, operational, logistical, and administrative support to aid and advise DoS Cyber & Technology Security (CTS) Directorate.  This includes protecting a global cyber infrastructure comprising networks, systems, information, and mobile devices all while identifying and responding to cyber risks and threats.    Location: Beltsville, MD. Hybrid after initial 90-days.     You must be able to support shift work. This current opening is for a 1st shift role, which is Sunday-Thursday 6:00am to 2:00pm.   In this role, you will: - Support the Cyber Incident Response Team (CIRT). - Detect, classify, process, track, and report on cyber security events and incidents. - Coordinate and collaborate with internal teams as needed to analyze and respond to events and incidents. - Perform triage and response capabilities 24x7x365. - Monitor and triage the CIRT hotline, email in-boxes, and fax. - Create tickets and initiate workflows as instructed in SOPs. - Report incident information to the U.S. CERT. - Collaborate with other local, national, and international CIRTs as directed. - Deliver and oversee remediation activities.    
Requisition ID
2024-145691
Telecommute Options
Flexible for occasional telework
Job Locations US-MD-Fort Meade
Requisition Post Information* : Posted Date 2 weeks ago(4/10/2024 4:46 PM)
Peraton is seeking an experienced Graphics Artist to join our USCYBERCOM team.   Location: Fort Meade, MD.   In this role you will:  - Provide graphic arts development and support for a high tempo subunified combatant command.  - Plan and design the production of graphics for two-star command-level briefings; exhibits, and multi-image presentations. - Prepare and oversee the preparation of original designs, drawings, graphs, charts, models, publications, and exhibits for internal and external presentation by senior leaders and general/flag officers. - Consult and advise customers’ staff regarding graphic projects requiring artist input. - Create and visualize ideas graphically for documents, publications, and web sites. - Provide end-users with recommendations and in-depth graphic artist support for the development of documents, briefings, and websites without guidance. - Revise subject matter for graphic presentation to achieve customer intent selecting materials, processes, and designs format without guidance. - Reviews layouts, sketches, and final plans for production and evaluates artistic media. - Consult with and advise customers concerning pending graphics, publications, and artwork, including cost estimates and artwork content. - Determine requirements for publication artwork, including selection of ink, paper, and type style in conjunction with publication customers. - Coordinate production workflow of publications (periodicals, brochures, and manuscripts). - Perform other ad hoc tasks in execution of Command Team cyber mission priorities as required.
Requisition ID
2024-145658
Telecommute Options
No remote/telework allowed
Job Locations US-MD-Laurel
Requisition Post Information* : Posted Date 1 week ago(4/15/2024 10:59 AM)
Peraton is seeking a senior-level Systems Engineer to join our team in Laurel, MD. In this role, you will be working in a cloud environment platform, built with Java on free and open-source software products including Kubernetes, Hadoop and Accumulo, to enable the execution of data-intensive analytics on a managed infrastructure. This position is on the Operations Team that ensures day-to-day operations stability, provides customer support, as well as knowledge in technical and troubleshooting repair expertise. The ideal candidate will have the ability to thrive in a fast-paced team environment who is self-motivated and proactively completes tasks with strong attention to detail. The candidate will be exposed to a variety of technologies depending on customer requirements. This is an on-call position and are expected to provide Tier 1 through 3 support. The candidate should have a strong background in troubleshooting operational issues in a Linux environment. Additional knowledge of Docker, Kubernetes, Hadoop and scripting experience such as python and bash is beneficial.   Other experience that could benefit the candidate: Prometheus, JIRA, Hadoop Distributed File System (HDFS), Virtualization, Salt/ Ansible, Grafana, Openstack and AWS.
Requisition ID
2024-145649
Telecommute Options
No remote/telework allowed
Job Locations US-DC-Washington
Requisition Post Information* : Posted Date 2 weeks ago(4/11/2024 3:17 PM)
Peraton is currently seeking skilled and qualified candidates for their Cyber Security Solutions Engineer/Architect position located in Washington, D.C. This position may be remote location for strongly qualified candidates. This position will lead special projects or investigations into specific technology or solution issues and to shepherd research and piloting of new technologies. Serve as a point of contact for engineering efforts and has overall responsibility for the accuracy and integrity of the customer's private enclave while maintaining compliance with the customer's enterprise-wide architecture policies and guidelines.   Day to Day Work Responsibilities: - Follow up with site administrators for status on non-compliant platforms and maintain any necessary exception documentation. - Configure and maintain IDS/IPS policies. - Perform database maintenance on IDS/IPS management consoles. - Maintain documentation for exceptions to standards. - Provides timely and adequate response to threats/alerts, including off-hour support. - The ability to assess security events to drive to a resolution. - Provides timely and sufficient response to security incidents and assessment services. - Promotes security awareness.
Requisition ID
2024-145645
Telecommute Options
Remote work allowed 100%
Job Locations US-MD-Linthicum
Requisition Post Information* : Posted Date 2 weeks ago(4/9/2024 5:32 PM)
This Senior Analyst position supports the Department of Defense Cyber Crime Center (DC3) and participates as a team member serving as a Cyber Intelligence Analyst that applies intelligence analysis skills to monitor, assess, and report on cyberspace operations, capabilities, vulnerabilities, and personalities that could pose a threat to Department of Defense (DoD) critical assets, the DoD Information Network (DoDIN), Defense Industrial Base (DIB) networks and supports US Intelligence Community and Interagency grid network sensor portfolios. Conducts reviews, identifies gaps, recommends solutions, and evaluates large datasets from a myriad of sources. Develops reports and briefing artifacts; may serve as a mentor to other mid-level analysts and junior staff. Works as an expert in the field, researches and evaluates technical and all-source intelligence with specific emphasis on cryptocurrency transactions and counter-threat finance, network operations, and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and US and DoD information networks. Analyzes threat data from various sources and network events to determine the impact on current operations and conducts all-source research to determine advisory capability and intent. Prepares assessments and cyber threat profiles of current events based on the sophisticated collection, research, and analysis of classified and Open-Source information. Develops and maintains analytical procedures to meet changing requirements and ensure maximum operations. Collects data using a combination of standard intelligence methods and business processes. Produces high-quality papers, presentations, recommendations, and findings for senior US government intelligence and network operations officials.
Requisition ID
2024-145641
Telecommute Options
Flexible for occasional telework
Job Locations US-NJ-Basking Ridge
Requisition Post Information* : Posted Date 2 weeks ago(4/9/2024 9:01 AM)
Peraton is seeking a Summer 2024 Formal Methods Research Intern in support of our Peraton Labs - Network Systems team in Basking Ridge, NJ. This role can be supported 100% remotely.   Peraton Labs delivers innovative solutions and revolutionary new capabilities to solve the most difficult and complex challenges for government agencies, utilities, and commercial customers. With a distinguished heritage tracing back to Bell Labs, Bellcore, DHPC, and Telcordia, we are a self-sustaining research center within Peraton that provides applied research and engineering to enable government agencies, utilities and commercial enterprises to fully exploit the future of communications, analytics and cyber security.   Role and responsibility for this position: We are seeking an intern for Summer 2024 who will work with project management and team members to design, implement, test, and integrate novel solutions to problems within projects under the Network Systems umbrella.
Requisition ID
2024-145635
Telecommute Options
Remote work allowed 100%
Job Locations US-VA-Rosslyn
Requisition Post Information* : Posted Date 2 weeks ago(4/10/2024 5:50 PM)
Peraton is currently seeking an experienced Cybersecurity Data Engineer to become part of Peraton’s Department of State (DoS) Diplomatic Security Cyber Mission (DSCM) program providing leading cyber and technology security experience to enable innovative, effective and secure business processes.  Peraton’s DSCM program encompasses technical, engineering, data analytics, cyber security, management, operational, logistical and administrative support to aid and advise DoS Cyber & Technology Security (CTS) Directorate.    Location: Hybrid after 90-days in Rosslyn, VA   What you’ll do: - Develop Extract Transform and Load (ETL) processes in support of ingesting and normalizing logs into a data lake. - Meet with stakeholders to design the formatting standards for logs. - Implement conversion capabilities to map and enrich data into  the agreed upon format. - Develop processes/code to enrich data on ingest to support users use cases. - Utilize tools like Cribl to develop data packs that can be used for future data feeds. - Lead other engineers in the development efforts for the ETL processes. - Provide continuous updates to data normalizing processes to ensure logs continue to support end users desired format. - Support systems issues to ensure the functionality and performance of log ingest and transformation. - Assist in verifying the compatibility of updates with existing configurations and applications. Additional or occasional asks to assist with one or more of the following:  - Consult with customer to gather and evaluate technical and business requirements in support of cyber monitoring. - Work with system owners to validate and support configurations for log transfer. - Provide technical expertise on cloud cluster computing techniques and technologies and expert advice to the program, and related cloud computing architectures. - Develop large data technologies, algorithms, and applications for clients. - Research, evaluate, and deploy advanced cloud computing systems and large data analytics for clients in research and production areas. - Work with massive data sets, complex algorithms, and team members from a variety of specialties to solve clients’ hardest problems. - Support a range of clients from front line analysts to researchers and senior leadership. - Work as a key contributor on a collaborative, and highly skilled team. - Experience with information extraction and analysis techniques, practices, and algorithms.    #DSCM
Requisition ID
2024-145630
Telecommute Options
Flexible for occasional telework
Job Locations DE-Stuttgart
Requisition Post Information* : Posted Date 2 weeks ago(4/8/2024 4:21 PM)
Peraton requires Cloud Security Engineers to support the Special Operation Command Information Technology Enterprise Contract (SITEC) – 3.  This position is located in Stuttgart, Germany and requires TESA approval.   The purpose of the Special Operations Forces Information Technology Enterprise Contract (SITEC) 3 Enterprise Operations and Maintenance (EOM) Task Order (TO) is to provide USSOCOM, its Component Commands, its Theater Special Operations Commands (TSOCs), and its deployed forces with Operations and Maintenance (O&M) services to maintain Network Operations (NetOps); maintain systems and network infrastructure; provide end user and common device support; provide configuration, change, license, and asset management; conduct training, and perform Install, Move, Add, Change (IMACs) services. The responsibilities and tasks associated with each requirement play a pivotal role to USSOCOM, the CIO/J6 organization, and ultimately the end-user who operate around the globe 24x7x365. The Cloud Security Engineer will have an active role in helping design, plan and implement secure cloud migrations as well as adopt new cloud technologies to support business and project needs. The Cloud Security Engineer must be a highly technical individual who is expected to serve as the subject matter expert (SME) on the Microsoft Azure, Office 365 and AWS platforms. The Engineer will need to be able to anticipate and lead the response to cyber threats, attacks and vulnerabilities and lead and perform risk analysis for vulnerabilities, incidents and change management requests. The Cloud Security Engineer will need the ability to quickly analyze large amounts of often conflicting data and make sound decisions in extremely stressful situations. The Engineer will have in depth experience with enterprise security controls including malware, protection, firewalls, intrusion detection systems, content filtering, internet proxies, encryption controls, and log management solutions. Typical duties include but are not limited to: - Gathers and understands internal customer requirements to develop reliable, secure - Researches new cloud technologies/configurations to continually improve security - Develops, test and implement plans for new designs/configurations - Presents ideas in business and user-friendly language - Prioritizes and execute tasks with minimal supervision - Designs, implement and operate of enterprise information security service capabilities and functions in large scale, technically complex organizations. - Works as part of a team and independently with limited - Prioritizes work, meet deadlines, lead, mentor and train others - Some positions may require shift work and/or an ability to work a non-standard work schedule to support the USSOCOM mission
Requisition ID
2024-145616
Telecommute Options
No remote/telework allowed
Job Locations US-VA-Chantilly
Requisition Post Information* : Posted Date 2 weeks ago(4/8/2024 1:14 PM)
The candidate will be a part of a cybersecurity compliance team procuring, building, testing, deploying, and maintaining internet architectures. Position supports the full lifecycle of the compliance program including orchestrating the program Plan of Action & Milestones (POAM), draft and shepherd architecture designs through the Sponsor’s Assessment & Authorization (A&A) process; procure, configure, and test site-specific architectures; organize, train, and equip Sponsor for distributed operations and maintenance. Duties: - Assist sponsor with site surveys for infrastructure changes needed to install and upgrade accredited internet systems. - Survey sites for resource and infrastructure changes needed to install accredited internet systems. - Serving as an IT Specialist performing Information Security (INFOSEC) and Security System Management duties. - Work with Sponsor to procure, receive, and stage system equipment. - Develop, test, and deploy remote access system components providing audit and remote management capabilities. - Develop and refine IDS signatures to reduce false positives and establish effective review of IDS alerts and elevate to Cyber Incident Response Team (CIRT). - Coordinate shipping system components. - Provide remote installation and troubleshooting support. - Occasional travel within WMA
Requisition ID
2024-145606
Telecommute Options
No remote/telework allowed
Job Locations US-MD-Fort Meade
Requisition Post Information* : Posted Date 2 weeks ago(4/8/2024 4:08 PM)
Peraton is hiring a Transition & Decommission (T&D) Systems Engineer to join our Cyber Mission business unit in Jessup, MD. As a Systems Engineeron our team, you will support one of the largest enterprise-wide engineering contracts within the Intelligence Community. This is a full-time position requiring 1880 hours of support per year; and work is performed at a customer location. As a T&D Systems Engineer on our team, you will provide senior systems engineering support to an operationally focused T&D team. These duties encompass the engineering activities and operational transition support activities for current and future T&D activities. SE support includes gathering and documenting legacy functions required in the modern architecture, translating functions into Minimal Viable Products for developers, consulting with Operations and Capabilities leads to resolve knowledge gaps, responding to analysts concerns, tracking analytic development, facilitating risk assessments, and documenting meeting discussions and actions. Currently preparing to support initial testing of transitioned functions on the modern architecture by capturing analysts’ problems and working with developers to resolve problems prior to formal transition to the modern architecture.
Requisition ID
2024-145600
Telecommute Options
No remote/telework allowed
Job Locations US-MD-Laurel
Requisition Post Information* : Posted Date 2 weeks ago(4/8/2024 1:32 PM)
Peraton is looking for a strong candidate who has a strong Network & Systems Engineering background supporting activities involving latest technology in support of Cloud Operations. Duties will include reviewing all requirements submitted by the customers and performing end-to-end network systems engineering and identify new requirements to achieve mission needs. You should have experienced in the design and implementation of data networks in support of Cloud Operation mission. In addition, network architectural design, implementation, and integration new systems. You should have knowledge/understanding and experience in network management protocols.   Duties may also include:   - Working with engineering and networks teams to provide customer requirements. - Designing and configuring the network and monitoring & maintaining the network. - Providing specifications and detailed schematics for network architecture - Providing specific detailed information for hardware selection, implementation of techniques and tools for the most efficient solution to meet mission needs, including present and future capacity requirements. - Experience/Expertise in all areas of network, hardware and interconnection and interfacing, such as routers, multiplexers, firewalls, hubs, bridges, gateways, etc. - Designing and implementing failover solution for major customers. - Appliances (ASA), Cisco Nexus 9k’s as well as Cisco 2960-XR Layer 2 switches. - Providing specific network solutions to support server requirements to include load-balancing, VPN’s, firewall contexts, and network address translation (NAT) where appropriate - Knowledge of CISCO 6500 series Catalyste, configuration switches 9332, 9336, 9508, ASR 1009, 1013, 1003, install GRE tunnels, MPLS and conduct redundancy test on multiples CISCO series network equipment
Requisition ID
2024-145585
Telecommute Options
No remote/telework allowed
Job Locations US-MD-Laurel
Requisition Post Information* : Posted Date 3 weeks ago(4/5/2024 12:43 PM)
Peraton is hiring a Zero Trust Test Engineer to join our Cyber Mission business unit in Fort Meade, Maryland. As a Test Engineer on our team, you will support one of the largest enterprise-wide engineering contracts within the Intelligence Community. This is a part-time position requiring 1664 hours of support per year; and work is performed at a customer location. As a Zero Trust Test Engineer on our team, you will support the government with planning, test oversight, and verification and validation activities as part of a customer organization at an Annapolis Junction Maryland Complex. You will support the government’s effort to establish a formal approach to developmental test and evaluation, operational test and evaluation and interoperability testing for a large program. In particular, you will assist the government by providing: - Expertise in Test Configuration Management, - Independent Verification and Validation (IV&V) strategy development, - Test planning to include advise on design and implementation of test and evaluation strategies, - Leadership for technical reviews on Systems Engineering/Testing artifacts, and prepare comments and recommendations, - Participation in reviews of systems and elements under development to ensure traceability of requirements, - Engagement with Government’s procured development test team on test planning, feature mapping, bug fixes, technical debt, - Awareness of status and schedule of programs of interest, - Monitoring of program preparation and execution of comprehensive test and evaluation plans, procedures, and schedules, - Coordination to ensure system integration, test, evaluation, and transition activities remain aligned across all stakeholders, - Recommendations of necessary changes in testing configurations, testing procedures, testing process, or new testing requirements, - Providing the Government with IV&V, assisting during testing activities, and - Planning for and monitoring of interoperability testing.
Requisition ID
2024-145584
Telecommute Options
Flexible for occasional telework
Job Locations US-VA-McLean
Requisition Post Information* : Posted Date 2 weeks ago(4/8/2024 3:50 PM)
The Systems Security Lead is responsible for applying security principles, practices, and procedures to maintain compliance with applicable security regulations, such as CNSSI, NIST, and National Industrial Security Program Operating Manual (NISPOM), governing the management of classified information systems. The Lead will perform responsibilities including identifying security control requirements; developing and updating system security plans; managing and controlling changes to specific systems, assessing the security impact of those changes, and maintaining system security configuration; supporting achievement of Authorization to Test (ATT) and ATO for information systems; working with the security to streamline ATT and ATO activities; directly or indirectly implementing, monitoring/auditing, and reporting compliance with security controls; preparing and completing action plans; providing security-related training and guidance; and implementing security-related change.
Requisition ID
2024-145563
Telecommute Options
No remote/telework allowed
Job Locations US-VA-Reston
Requisition Post Information* : Posted Date 3 weeks ago(4/4/2024 9:59 AM)
Peraton Labs delivers innovative solutions and revolutionary new capabilities to solve the most difficult and complex challenges for government agencies, utilities, and commercial customers. With a distinguished heritage tracing back to Bell Labs, Bellcore, DHPC, and Telcordia, our experts pave the way. Peraton Labs’ cybersecurity and RF research pushes the envelope of technologies, extends state-of-the-art to produce advanced solutions that are customized to meet the objectives of research sponsors and customers.   Role and responsibilities for this position: The Research Scientist Senior Director will work with the Peraton Labs Growth Lead to grow and maintain the pipeline with various government research and development organizations as well as potential transfer partner organizations. They will also work closely with the Strategic Innovation Group OU and BU Leads to understand and further their new business goals for both new and on-contract growth. Further, the Senior Director will understand the growth goals of the larger Peraton organization, identify technology transition and new growth opportunities for the organization. Success in this role is ultimately measured by meeting and exceeding acquisition and financial targets aligned to company goals. - Establish market campaigns, engagement plans, and strategic partnerships to improve offerings and achieve business objectives - Develop and mature key relationships within customer organizations across the DoD and IC - Research and analyze the competitive landscape to identify market shifts, identify gaps, and focus the organization on “what’s next” - Develop and deliver required business acquisition artifacts, reports, and presentations - Cooperate with other leaders across the Strategic Innovation Group and other business sectors across the enterprise to deliver collaborative solutions - Support direct program technical requirements in an advisory/SME capacity - Travel as required, as dictated by business needs
Requisition ID
2024-145531
Telecommute Options
Remote work allowed 100%
Job Locations US-MD-Fort Meade
Requisition Post Information* : Posted Date 3 weeks ago(4/4/2024 6:44 PM)
Mission: We provide expert, onsite support in research and development of software designed to exploit vulnerabilities of adversary technology, algorithm development, script writing and software utility development, use of multiple programming languages, analysis and reverse engineering of source code, software integration and testing, technical writing and documentation, and lifecycle maintenance of software programs.   We are interviewing candidates for our Exploit Software Developer roles. These developer roles are critical to the success of our tool development in the support of our customer's application systems.    You will have the opportunity to: - Provide on-site support in research and development of integration software designed to exploit vulnerabilities of adversary technology, algorithm development, script, light script writing and software utility development, analysis and knowledge of tools needed for reverse engineering of source code, software integration and testing, technical writing and documentation, and lifecycle maintenance of customer software programs. - Developed software to ingest a capability, unpack the tool, remove documentation and guides, and ready the tool for release to infrastructure - Develop software using sockets and other network programming concepts to enable communication between software modules. - Monitors technology trends such as emerging standards for new technology opportunities. - Provide new functional capabilities and improve existing cyber operations mission systems at a classified level. - Python, HTML, CSS development and integration of programs on existing cyber operations mission systems  - Plan, direct, and coordinate all activities associated with creating software across multiple functional areas and products. - Prioritize and allocates projects, products, and resources with the assistance of architects and managers. - Participate in the strategic decisions about technology, definition, and implementation of the software products. - Demonstrate familiarity with high-level software design, development techniques, test and integration techniques, and possess the ability understand software modules, system, and subsystems documentation. - Plan, direct, and coordinate activities of a multi-team or cross-functional organization. - Direct software development projects to include, ensuring that projects are completed on time and according to quality standards, facilitating communication upward and across project team including project status, justifications for variances and technical information.
Requisition ID
2024-145529
Telecommute Options
No remote/telework allowed
Job Locations US-VA-Arlington
Requisition Post Information* : Posted Date 2 days ago(4/23/2024 12:20 PM)
Peraton is currently seeking a Process and Knowledge Manager to become a part of the Department of State's Bureau of Diplomatic Security, Directorate of Cyber and Technology Security, Office of Cyber Monitoring and Operations, Monitoring and Incident Response Division (DS/CTS/CMO/MIRD).    Location: Arlington, VA.   In this role, you will:  - Work with MIRD leadership to identify areas of process and knowledge management improvement. - This includes delving deeply into the processes of each team and seeking out ways of making them more efficient and collaborative across teams. - Create and implement plans for process and knowledge management improvements. - This may involve addressing inefficiencies in customer interaction processes, automating report generation, and other initiatives to enhance productivity and collaboration. - Assist the project management lead with ongoing projects, particularly those focused on cybersecurity improvements such as on-boarding new tools, automating processes, and improving effectiveness. - Collect and present reports on process improvements and project progress. - These reports may include internal metrics, Federal Information Systems Management Act (FISMA) numbers, and metrics set by our higher-level organization to drive improvement. - Translate verbal description of processes into visual maps or other graphical representations to help identify improvements.  - Identify measurable metrics to demonstrate process improvement trends over time, and report on progress. - Understand and cater to the needs of information end-users, ensuring easy access to organized content through platforms like SharePoint. - Monitor the usage of knowledge management resources, reporting on their effectiveness and managing related projects. - Lead initiatives to foster a culture of knowledge management and information sharing within the organization. - Oversee the categorization, indexing, storage, and access of all organizational knowledge, including various types of documents. - Design and maintain a comprehensive knowledge management framework, promoting knowledge sharing through the organization's operational processes and systems. - Some examples of knowledge the candidate will manage includes, but isn't limited to: annual and quarterly FISMA artifacts, standard operating procedures (SOPs), technical standard operating procedures (TSOPs), Knowledge Base (KB) articles, concept of operations documents, quarterly performance metrics, internal and external SharePoint pages, inter-divisional product sharing, on-boarding/training, etc. - Need to have a proactive approach, excellent communication skills, and a passion for improving processes, knowledge management, and assisting with project management within an organization.   #DSCM
Requisition ID
2024-145522
Telecommute Options
Flexible for occasional telework
Job Locations US-MD-Fort Meade
Requisition Post Information* : Posted Date 3 weeks ago(4/5/2024 12:49 PM)
Peraton is seeking an experienced Cybersecurity Engineer to join our USCYBERCOM team.   Location: Fort Meade, MD.   In this role you will: - Possess an in-depth understanding and the ability to apply intermediate concepts of cyber engineering and cybersecurity. - Maintain in-depth knowledge and understanding of the DoD cybersecurity policies and the Risk Management Framework. - Independently conduct cybersecurity engineering research and analysis, provide recommendations for the implementation of security mechanisms, and provide advise or counsel on recommended cybersecurity practices and requirements. - Contribute substantive content to the development of cybersecurity documentation, concept papers, and test plans required by Command policies and the Risk Management Framework. - Maintain comprehensive knowledge and understanding of DoD and/or Intelligence Community (IC) engineering efforts, across multiple engineering disciplines. - Independently evaluate functional operation and performance, and based on test results and inspections, make recommendations regarding C&A. - Be the liaison between the operators, the developers and the system engineers; ensure compliance with DoD and NIST requirements. - Assess infrastructure requests; provide recommendations and guidance on development.
Requisition ID
2024-145510
Telecommute Options
No remote/telework allowed
Job Locations US-FL-MacDill AFB
Requisition Post Information* : Posted Date 3 weeks ago(4/4/2024 5:07 PM)
Peraton requires Cyber Security Analyst (JRNY) to support the Special Operation Command Information Technology Enterprise Contract (SITEC) – 3. Positions are located at the SOCOM Headquarters at MacDill, AFB FL, and at the TSOC and Component locations in the United States and abroad.   The purpose of the Special Operations Forces Information Technology Enterprise Contract (SITEC) 3 Enterprise Operations and Maintenance (EOM) Task Order (TO) is to provide USSOCOM, its Component Commands, its Theater Special Operations Commands (TSOCs), and its deployed forces with Operations and Maintenance (O&M) services to maintain Network Operations (NetOps); maintain systems and network infrastructure; provide end user and  common device support; provide configuration, change, license, and asset management; conduct training, and perform Install, Move, Add, Change (IMACs) services. The responsibilities and tasks associated with each requirement play a pivotal role to USSOCOM, the CIO/J6 organization, and ultimately the end-user who operate around the globe 24x7x365.   Duties and responsibilities include but are not limited to:   • Investigate alerts, anomalies, error, intrusions, malware, etc. to identify the extent of a security incident and be able to help isolate the responsible agents. • Maintains multiprotocol routers, multilayer switches, network security devices and network management systems. • Performs systems administration, maintenance, computer security, and support for servers on networks and Computer Network Defense-Service Provider (CND-SPs) • Performs changes to associated routers, switches, and encryption devices. • Recommends improvements automated information system security polices • Maintains and operates a services support program that provides systems administration, maintenance, computer security, and support for servers on networks. • Provides systems administration, maintenance, computer security, and support for physical servers, • Performs system, security, and operational testing/evaluation events. • Tests to ensure Government data is protected from unauthorized disclosure and remains under Government control. • Tests to verify configuration and protections of external and internal data flows between applications, containers, virtual devices, virtual machines, and cloud infrastructure. • Tests to verify data at rest encryption on cloud infrastructure. • Tests the build and related procedures. • Detects network intrusions and cyber incidents • Detects, identifying, and alerting the Government of possible attacks/intrusions, anomalous activities, and misuse activities, distinguishing these incidents and events from benign activities. • Assists in incident response • Monitors systems security and responding to security incidents • Participates in security systems testing • Ensures integrity and confidentiality of sensitive data • Prevents and detecting intrusion • Supporting incident containment and remediation recommendations • Conducts log file analysis • Uses various tools such as Remedy, Splunk, and Office Automation to perform duties • Some positions may require work outside a traditional work schedule to support the needs of the customer  
Requisition ID
2024-145501
Telecommute Options
No remote/telework allowed
Job Locations US-MD-Fort Meade
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 12:46 PM)
Peraton is currently seeking to hire an experienced Cyberspace Intelligence Analyst for the USCYBERCOM program located at Fort Meade, MD.   In this role you will: - Lead and act as a full participant in JPGs and OPG/OPTs developing and integrating cyber capabilities into planned operations, and in support of Combatant Commander regionally-focused planning efforts - Contribute to the development of cyberspace operations through the analysis of intelligence products; perform a vast array of cyberspace intelligence analyst duties with limited guidance - Possesses an in-depth understanding of intelligence analytic concepts to monitor, assess, and report on cyberspace operations, capabilities, and vulnerabilities - Contribute substantive content for operational level reports, briefings, and Operational plans (OPLANS) - With no guidance, advises stakeholders and coordinate actions - Develop, integrate, and maintain operational TTPs, SOPs, and Concept of Operations (CONOPs) - Evaluate countermeasure assessments and provide recommendations to leadership on implementation of counter measures - Contribute substantive content to the development of complex analytic approaches and recommendations to problems and situations for which data are incomplete, controversial, or which no precedence exists - Perform other ad hoc tasks in execution of Commander's Cyber Mission assessment priorities.
Requisition ID
2024-145493
Telecommute Options
No remote/telework allowed
Job Locations US
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 11:50 AM)
  If you are a skilled IAM Engineer with a passion for implementing and managing cutting-edge IAM solutions, we encourage you to apply for this exciting opportunity. Join us in safeguarding our organization's assets and data against cyber threats and ensuring compliance with regulatory requirements.   We are seeking an experienced and motivated Identity and Access Management (IAM) Engineer to join our dynamic team.  As an IAM Engineer, you will play a critical role in designing, implementing, and maintaining our IAM infrastructure using industry-leading solutions.  This role requires deep technical expertise in IAM technologies and a strong understanding of security best practices. This is a Telework position.     What you will do:   - Design, implement, and manage identity and access management solutions using industry-leading solutions like AWS IAM, IBM Security Identity Manager, SailPoint, and Ping Identity to ensure the security and integrity of our systems and data. - Collaborate with cross-functional teams to gather requirements, design IAM solutions, and integrate them with existing systems and applications. - Configure and manage user identities, roles, and access permissions across various platforms and environments. - Develop and implement IAM policies, procedures, and standards to enforce security controls and compliance requirements. - Conduct access reviews, audits, and risk assessments to identify security vulnerabilities and ensure adherence to regulatory frameworks. - Monitor IAM systems for security incidents and proactively respond to threats and vulnerabilities. - Automate IAM processes and workflows using scripting languages and automation tools to improve efficiency and scalability. - Provide technical guidance and support to internal teams on IAM-related issues and initiatives. - Stay current with emerging technologies and trends in IAM to continuously improve our IAM infrastructure and practices. - Participate in incident response activities and collaborate with security teams to investigate and mitigate security incidents. - Stay abreast of emerging technologies and trends in IAM, cloud security, and identity governance to continuously improve our IAM architecture and practices. - Collaborate with enterprise architecture teams to ensure that IAM solutions align with overall IT architecture principles and standards. - Participate in incident response and security incident investigations related to IAM systems. - Facilitate clear communication across teams, providing updates on release status, known issues, and any potential impact on stakeholders. Coordinate communication of release schedules and changes to all relevant parties
Requisition ID
2024-145481
Telecommute Options
Remote work allowed 100%
Job Locations US
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 11:49 AM)
  If you are a skilled IAM Engineer with a passion for implementing and managing cutting-edge IAM solutions, we encourage you to apply for this exciting opportunity. Join us in safeguarding our organization's assets and data against cyber threats and ensuring compliance with regulatory requirements.   We are seeking an experienced and motivated Identity and Access Management (IAM) Engineer to join our dynamic team.  As an IAM Engineer, you will play a critical role in designing, implementing, and maintaining our IAM infrastructure using industry-leading solutions.  This role requires deep technical expertise in IAM technologies and a strong understanding of security best practices. This is a Telework position.     What you will do:  - Design, implement, and manage identity and access management solutions using industry-leading solutions like AWS IAM, IBM Security Identity Manager, SailPoint, and Ping Identity to ensure the security and integrity of our systems and data. - Collaborate with cross-functional teams to gather requirements, design IAM solutions, and integrate them with existing systems and applications. - Configure and manage user identities, roles, and access permissions across various platforms and environments. - Develop and implement IAM policies, procedures, and standards to enforce security controls and compliance requirements. - Conduct access reviews, audits, and risk assessments to identify security vulnerabilities and ensure adherence to regulatory frameworks. - Monitor IAM systems for security incidents and proactively respond to threats and vulnerabilities. - Automate IAM processes and workflows using scripting languages and automation tools to improve efficiency and scalability. - Provide technical guidance and support to internal teams on IAM-related issues and initiatives. - Stay current with emerging technologies and trends in IAM to continuously improve our IAM infrastructure and practices. - Participate in incident response activities and collaborate with security teams to investigate and mitigate security incidents. - Stay abreast of emerging technologies and trends in IAM, cloud security, and identity governance to continuously improve our IAM architecture and practices. - Collaborate with enterprise architecture teams to ensure that IAM solutions align with overall IT architecture principles and standards. - Participate in incident response and security incident investigations related to IAM systems. - Facilitate clear communication across teams, providing updates on release status, known issues, and any potential impact on stakeholders. Coordinate communication of release schedules and changes to all relevant parties
Requisition ID
2024-145480
Telecommute Options
Remote work allowed 100%
Job Locations US
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 3:29 PM)
Thank you for your interest in the Peraton Talent Network! Technology capabilities are changing rapidly. What doesn't change are the technical skills we hire for at Peraton: - Architects - Cloud Specialists - Corporate Roles - Cyber Professionals - Engineers - Intelligence Professionals - Research Scientists - Satellite Systems Specialists - Systems Administrators By applying here, you will be joining our network of talented individuals interested in exploring Peraton opportunities. Your resume and profile will be one of the first stops for our Talent Acquisition (TA) team members as they look for well-qualified candidates to fill our many roles!    Join Our Talent Network By Applying Below Today!   You should expect to be contacted by any one of our numerous TA team members if you are identified as a potential fit for any of our exciting opportunities.  Once you are connected with our TA member, you will work side by side to determine if you are interested in moving forward.   This will not replace any of your active applications.  Please continue to visit the Peraton careers page and apply to any position you are interested in and qualified for.   If you have any questions or need assistance, please contact our Enterprise Sourcing Team members at the contact provided below.   Gabe Bryant (gbryant@peraton.com) John Eells (jeells@peraton.com)   **This posting represents all opportunities at Peraton and does not represent a set minimum or maximum compensation range. Salary range is based on geographical location and experience.**    
Requisition ID
2024-145476
Telecommute Options
No remote/telework allowed
Job Locations US-VA-Home
Requisition Post Information* : Posted Date 3 weeks ago(4/5/2024 8:52 AM)
Peraton is seeking a Security Operations Center (SOC) Analyst (SOC Analyst) to join our team of qualified and diverse individuals. The SOC Analyst will be part of the Department of State (DOS) Consular Affairs Enterprise Infrastructure Operations (CAEIO) Program for the Bureau of Consular Affairs (CA). The CAEIO Program provides IT Operations and Maintenance to modernize the legacy networks, applications, and databases supporting CA services globally.   Responsibilities   The SOC Analyst is a member of a team that enhances CA’s security posture. The SOC Analyst uses tools, such as Splunk, to monitor the environment, investigates alerts, and performs threat hunting. The SOC Analyst performs Computer Network Defense monitoring, analytics, and incident responding. Identifies and escalates incidents following document procedures and SOPs. Coordinates with internal and external teams to address threats and risks via investigation and forensic analysis. Able to perform direct and advisory roles in oversight planning and implementation of projects and initiatives. Responsible for advising management and team members of risks associated with technologies and implementation approaches and identify methods of risk. Support problem resolution and identify process improvements.   Tasks the SOC Analyst performs include, but are not limited to:  - Implement automation orchestration to replace repetitive tasks which are being conducted. - Develop monitoring via advanced dashboards, alerts, data models, reports. - Design and customize complex search queries and promoting advanced searching for computer/network forensics. - Perform log analysis to identify trends, abnormal behavior, correlate events, and detection of TTPs. - Participate in incident, problem, and change management processes. - Perform real-time cyber defense incident handling tasks (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation)  to support Incident Response Teams (IRTs). - Develop new and maintain/update  documentation for SOPs, Playbooks, and job aids. - Provide system/equipment/specialized training and technical guidance. - Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. - Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event's history, status, and potential impact for further action in accordance with the organization's cyber incident response plan. - Analyze log files from a variety of sources (e.g., individual host, network traffic, firewall, and intrusion detection system (IDS) logs) to identify possible threats to network security. - Perform assessments to identify and resolve monitoring gaps. - Communicate with customers and teammates clearly and concisely. Core Work Schedule: First and weekend shift (Saturday - Wednesday, 7:00 AM – 3:30 PM)   Work Location: Hybrid: remote AND up to two days per week in the office in Sterling, VA or Washington, DC.
Requisition ID
2024-145465
Telecommute Options
Flexible for occasional telework
Job Locations US-MD-Laurel
Requisition Post Information* : Posted Date 3 weeks ago(4/5/2024 4:40 PM)
Peraton has an immediate opportunity for a cleared Junior Systems Engineer to join our team here in Laurel, MD. This is a great opportunity for anyone who would like to join a large Cyber and Data Management program where they can continue to develop their skills and grow with our amazing technical team. As a Systems Engineer, you'll do the following tasks: - Creator of program artifacts to include compliance, performance, and operational documentation - Formulation and documentation of client performance strategies and initiatives - Researched, drafted, designed and developed individual system requirements to meet client specifications of compute, storage, capability, capacity and sustainment. - Create individual configuration, functional and system requirements for each system built in order to meet and exceed customer requirements - Gather technical information, prepare written text - Use Office tools such as MS Word, PowerPoint, Visio, etc.
Requisition ID
2024-145455
Telecommute Options
No remote/telework allowed
Job Locations US-HI-Halawa
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 12:47 PM)
PERATON OVERVIEW Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our employees do the can’t be done, solving the most daunting challenges facing our customers. RESPONSIBILITIES Peraton requires a Lead Logistician for the Command, Control, Communications, Computer, Combat Systems, Intelligence, Surveillance, and Reconnaissance (C5ISR) services for the Long-Range Enterprise Intelligence Surveillance and Reconnaissance (ISR) Activity (LEIA) Task Order at Camp H.M Smith, Hawaii in support of Special Operations Command, Pacific (SOCPAC). SOCPAC requires contractor services to provide a broad spectrum of C5ISR capabilities to facilitate SOCPAC missions. SOCPAC requires flexible services including, but may not be limited to, Contractor Owned, Contractor Operated (COCO) capabilities using air, surface, subsurface, space, and cyber platforms to meet mission needs in an ever-changing threat and technology landscape. SOCPAC requires that these services continuously leverage the latest C5ISR technologies and best practices to rapidly refresh capabilities and ensure that platforms and intelligence operations provide optimal capabilities. SOCPAC requires these services to be performed primarily within the USINDOPACOM AOR, but ancillary and supporting activities may be performed globally. SOCPAC is a Theater Special Operations Command (TSOC) under the United States (U.S.) Special Operations Command (USSOCOM) and serves as the functional component for all special operations missions deployed throughout the Indo-Pacific region. SOCPAC coordinates, plans, and directs all special operations in the Pacific theater supporting U.S. Indo-Pacific Command (USINDOPACOM) as a sub unified command. The USINDOPACOM Area of Responsibility (AOR) is the priority theater for the Department of Defense (DoD), covering 51 percent of the globe and 60 percent of the world’s population. The USINDOPACOM AOR is like no other geographic region. The region is culturally, socially, economically, and geopolitically diverse, with more than 35 nations comprising the Asia-Pacific region and is home to more than 3,000 different languages, and several of the world’s largest militaries. More than one third of Asia-Pacific nations are smaller, island nations, including the smallest republic in the world and the smallest nation in Asia. Duties and responsibilities include but are not limited to: - Lead the management and control of program wide assets - Initiate and maintain the processes, systems, procedures, records, and methodologies necessary for effective and efficient control - Lead internal assessments, auditing of inventory, and oversight of Government Property Loss investigations - Lead proper property disposition in coordination with the AAS Property Administrator (PA) Location - Camp H.M. Smith, Hawaii
Requisition ID
2024-145454
Telecommute Options
Flexible for occasional telework
Job Locations US-CO-Schriever AFB
Requisition Post Information* : Posted Date 3 weeks ago(4/2/2024 11:48 AM)
  Are you ready to make an impact?  Peraton is seeking a driven System Administrator to join our Consolidated Air Force Space Command Modifications, Maintenance, and Operations (CAMMO) program at Schriever AFB, CO. Be part of a fast-pace, mission-focused environment providing operations, maintenance and sustainment support of global Air Force Satellite Control Network (AFSCN) mission and non-mission equipment.     This poisition will work Mid-Shift (10:00 pm to 6:00 am)   Responsibilities: As a Systems Administrator, you will get a very broad range of hands-on work to include performing trunk/circuit testing and monitoring to ascertain compliance with specified parameters.   - Performs operations, maintenance and systems administration on the OSR Systems, WANIUs, encryption devices and other systems associated with Air Force Satellite Control Network (AFSCN) Operational Control Node (OCN) at Schriever  AFB, CO - Maintain computer networks including VPNs, router, switches and other physical hardware; install and configure network equipment; configure and manage firewalls as required; monitor computer systems to improve network performance for all systems - Coordinates efforts with customers, associate contractors and fellow CAMMO program personnel to ensure highly successful operations, configuration, and verification of connectivity - Develop/deploy ANETS VMware solutions; administer, configure, and troubleshoot/resolve VMWare environment issues; install operating systems, service packs, security patches and bug fixes as directed; provide technical support and document VMWare processes; keep informed of related developments in VMWare technologies and products; VMWare Certified Professional (VCP) preferred; extensive knowledge of the fundamentals of VMWare ESX and related technologies - Windows Server and Active Directory  knowledge; must have knowledge of server technologies; implement  highly-available server/networking/storage infrastructure; candidate may be involved in providing planning and execution of projects; troubleshoot and provide technical analysis concerning operating system, network, and application performance issues to resolution; coordinate problem management and resolution among a variety of functional areas and provide subject matter expertise support for diagnosing and resolving problems - Client/Server management and architecture work experience; client/server experience and provide judgment and analysis for the design, development and implementation of client/server system; analyze client/server requirements to ensure the system meets performance requirements; must be familiar with relational databases - Monitor and troubleshoot system/application activity and performance; perform functionality and integration testing for new and updated Endpoint Security Software; assist in the implementation of policies and standards related to the use of computing resources, overall implementation and operational aspects of multiple systems, operating environments and related software - Provide network engineering support and install, operate, configure, optimize, and maintain the Cisco Identify Services (ISE) tool for the enterprise; provide network engineering expertise to deploy Cisco ISE network access control features; implement, configure and administer CISCO ISE; provide remediation recommendations and mitigating strategies for vulnerabilities discovered and maintain in-depth knowledge of DISA Security Technical Implementation Guidance (STIG), STIG technologies such as Tenable Nessus, STIG Viewer, Security Requirements Guides (SRG), Security Content Checker (SCC), STIG benchmarks, open-source tools such as Vulnerator, and other automated tools that assist with the assessment of security controls and the presentation of security assessment results; support the development, documentation and delivery of training and training materials on all cyber tools, software, processes and policies. - Implement, maintain, and configure SolarWinds; continuously automate and tune monitors to limit false alarms; administer components as required; ability to implement, administer, configure and secure the SolarWinds suite of products - Develops procedures and trains personnel and performs complex operations - Accepts, develops and implements the more complex configuration changes associated with the OSR and related systems - Perform account management, systems and database administration, testing, PMIs and troubleshooting/fault repair - Perform systems administration, database administration and master document upkeep, account management, software support and maintenance, outage documentation review, and repair of computer systems. - Perform customer service, configuration and touch maintenance on office use personal computer systems and peripheral devices. - Perform simple operations and maintenance tasks on classified and unclassified audio/visual (AV) and video teleconferencing (VTC) equipment. - Perform inventory control of classified and unclassified personal computer desktop systems, printers, peripheral devices, AV and VTC equipment. - Interface with network system administrators and service desk teams to open and track job tickets on systems
Requisition ID
2024-145451
Telecommute Options
No remote/telework allowed
Job Locations US-GA-Fort Gordon
Requisition Post Information* : Posted Date 2 weeks ago(4/9/2024 2:20 PM)
Peraton seeks a DevSecOps Engineer to support the design, implementation, and maintainance of  modern cloud infrastructure, with a focus on AWS for hosting DevSecOps tools.  Location:  Fort Eisenhower, GA. This position requires working closely with DoD and Army cybersecurity organizations to ensure secure and reliable infrastructure operations. The role involves architecting cloud solutions that support scalable, secure DevSecOps tools across AWS, Azure, and on-premises environments. Collaboration with cybersecurity teams is essential to enforce security measures across the multi-cloud ecosystem. The ideal candidate will have experience in platform development, Infrastructure as Code, Kubernetes, and CI/CD technologies, with a deep understanding of AWS and Azure platforms.   Tasks include: • Responsible for the overall design and implementation of modern cloud infrastructure and associated containerizations and software development platform. • Work with DoD and Army cyber organizations to ensure connectivity and reliable operations of the infrastructure. • Design and Implement Cloud Infrastructure in AWS:  focus on architecting and deploying modern cloud infrastructure specifically in AWS to serve as the primary hosting environment for DevSecOps tools, ensuring that these tools are scalable, secure, and resilient. • Ensure DevSecOps Tool Availability Across Multi-Cloud and On-Premises: Develop strategies and implementations that enable the secure and efficient distribution and operation of DevSecOps tools across the AWS and Azure platforms, as well as on-premises environments.  • Collaborate with Cybersecurity Teams to enforce strict security measures that are consistent and effective across the multi-cloud ecosystem and on-premises, focusing on securing the DevSecOps tools and the data they handle.
Requisition ID
2024-145445
Telecommute Options
Flexible for occasional telework
Job Locations US-GA-Fort Gordon
Requisition Post Information* : Posted Date 2 weeks ago(4/9/2024 12:25 PM)
Peraton seeks a Cyber Threat Planner to support the ARCYBER G25.  Location: Fort Eisenhower, GA.  In this role, you will provide strategic, operational and some tactical intelligence planning, enabling situational awareness and threat warning, delivering intelligence products, and assisting ARCYBER’s targeting efforts in the human and information dimensions.  Demonstrated experience in IO / EW is strongly desired.   Tasks include: Provide a broad range of research, programmatic, and administrative functions in support of programming, capabilities, integration, organizational design, and force integration, as required. - Support current and long-term planning for Cyber Intelligence Preparation of the Environment (CIPE) and Course of Action (COA) development. - Participate in exchanges with partners, develop contacts with counterparts, establish analytic collaboration (i.e., subordinate units, higher agencies, the IC, and external partners) to maintain situational awareness to support services and joint common operations and to conduct intelligence and for information sharing. - Support the integration of OSINT collection, analysis, production, and dissemination of publicly available information. - Comply with DoD Directive (DoDD) 5148.13 Intelligence Oversight Section 4: report any Questionable.
Requisition ID
2024-145443
Telecommute Options
No remote/telework allowed
Job Locations US-MD-College Park
Requisition Post Information* : Posted Date 3 weeks ago(4/2/2024 4:27 PM)
This position is an integral member of the Peraton Labs Network Systems and Cyber Mission Sector team supporting a customer site in College Park, Maryland.   Responsibilities may include: - Implement, maintain, and enhance complex and diverse research infrastructure systems and their appropriate security posture. - Perform Linux and Microsoft Windows system administration tasks. - Windows and Linux server system administration - Integrating GOTS/COTS/open-source solutions - Virtualization technologies - Networking and TCP/IP protocols - Storage technologies - Remote access - Install, configure, and troubleshoot IT/networking hardware and software in classified and unclassified spaces; Activate network ports including patch network when needed. - Interface with the customer as well as monitor and direct subcontract tasking - Implement, maintain, and enhance a complex and diverse development environment. - Prepare and maintain images for Linux and Microsoft Windows operating systems. - Configure new systems and apply best practice security configuration on computers, servers, and network equipment. - Perform system and anti-virus tool updates regularly. - Install, configure and troubleshoot hardware, networking devices and software. - Implement physical controls. - Physically setup, cable, and power computers in classified and unclassified spaces for new programs or new computer additions; Activate network ports including patch network when needed. - Devise information system backup mechanism for program’s specific requirements; perform system/date backup and archive logs according to security plan; exercise system and data recovery procedures regularly. - Create custom solution or provide commercial tool recommendations to automate audits procedures where SCAP Compliant Checker lacks proper functions to support. Examples include automated log rotation, mechanism to alert audit process failures, or scripts to detect inactive accounts. - Support ISSM to perform audit tasks as needed. - Develop and execute approved procedures for sanitizing and releasing system components and media. - Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures. - Complete required trainings timely
Requisition ID
2024-145433
Telecommute Options
No remote/telework allowed
Job Locations US-CA-El Segundo
Requisition Post Information* : Posted Date 3 weeks ago(4/2/2024 7:09 AM)
Ready to make an impact! Peraton is seeking an experienced Senior Crypto/COMSEC Cyber Engineer to work side by side with our client in El Segundo, CA!   As an engineer on our team, you’ll work with Peraton on the Remote Sensing SE&I program with the U.S. Space Force to develop and rapidly deploy the next generation of resilient Missile Warning (MW), Tactical Intelligence, Surveillance, and Reconnaissance (TISR), and Environmental Monitoring (EM) capabilities to deter attacks and provide critical information to our war-fighters to defeat our enemies in battle.  Your customer will trust you to not only test, analyze, evaluate, validate, and verify these systems, but also identify areas requiring urgent mitigation up front and early to develop this system with advanced technology solutions.    Grow your skills by merging innovative engineering methodologies and cross-disciplinary coordination to create tomorrow’s solutions. Join our team and create the future of Remote Sensing in the Space Force.    **Due to the nature of work performed within this facility, U.S. citizenship is required**   The Senior Crypto/COMSEC Cyber Engineer will be responsible for the following but not limited to: - Provides feedback to design engineers and evaluates end-to-end systems and systems-oriented products through their entire life cycle. - Working as expert, conducts research and evaluates technical performance of software products and overall segments and systems. - Ensures products and systems comply with requirements and government information assurance and cyber security standards and practices through formal verification methods. - Verifies/validates systems with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to information networks. - Assesses performance using evaluation criteria and technical performance measures. - Prepares assessments and cyber threat profiles of current and planned products based on sophisticated testing, research, and analysis. - Participates in design reviews of components (hardware and software) to ensure applicability to the current system and traceability of requirements. - Reviews test plans/procedures and ensures they verify/validate the requirements. - Develops and maintains analytical procedures to meet changing requirements. - Produces high-quality papers, presentations, recommendations, and findings for senior US government intelligence and operations officials. - Monitors for continual process improvement and lessons learned, and reports to management periodically.
Requisition ID
2024-145429
Telecommute Options
No remote/telework allowed
Job Locations US-AZ-Fort Huachuca
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 1:03 PM)
Responsibilities include, but are not limited to: • Monitor and acti on SIEM platforms for alerts, events, and rules providing insight into malicious activities and/or security posture violatons • Review intrusion detection system alerts for anomalies that may pose a threat to the customer’s network • Identify and investigate vulnerabilities, asses exploit potential, and suggest analytics for automation in the SIEM engines • Report events through the incident handling process of creating incident tickets for deeper analysis and triage activities • Classify incident reports IAW Army and DoD regulations after identifying root cause and issuing remediation actions to system owners • Perform post intrusion analysis to determine shortfalls in the incident detection methods • Develop unique queries and rules in the SIEM platforms to further detection for first line cyber defenders • Determine IDS/IPS rule false positi ves to recommend tuning of rules to reduce noise and inceaefidelity • Respond to the higher headquarters on incidents and daily reports • Provide daily updates to Defensive Cyber Operations staff on intrusion detection operation and trends of events causing incidents • Prepare charts and diagrams to assist in metrics analysis and problem evaluation, and submit recommendations for data mining andanalytical solutions • Write reports of remotely exploitable vulnerabilities to increase customer situational awareness and improve the customer’s cyber security posture • Assist all sections of the Defensive Cyber Operations team as required in performing Analysis and other duties as assigned • Travel to customer sites to perform network security evaluations • May perform documentation and vetting of identified vulnerabilities for operational use
Requisition ID
2024-145426
Telecommute Options
No remote/telework allowed
Job Locations US-AZ-Fort Huachuca
Requisition Post Information* : Posted Date 3 weeks ago(4/2/2024 2:12 PM)
Responsibilities include, but are not limited to: • Provides leadership and management to the execution, definition, and strategy of enterprise applications technology projects • Responsible for the end-to-end management of one or more medium to large sized, moderately to highly complex software development projects within the IT and operating departments • Responsible for scoping, planning, executing, and monitoring the projects to keep projects on schedule, on budget, and following appropriate protocols with Technical Operations, Application Development and Business Intelligence teams • Performs strategic planning, coordination of a roadmap, development, construction, and implementation plan to address the software platform for the organization • Serves as CIO's representative on all application development projects, working with department heads to ensure seamless transition of new and existing customers in all aspects of IT and business operations • Works with new business implementation leads to identify workflows, protocols, information gathering for new client implementations • Develops project plans to manage the end-to-end project activities and execution approach • Establishes software development processes and metrics that measure and improve team performance • Establishes a Process Framework for all Development enhancements, projects, and releases. • Participates and works with Software Architects and Developers in the analysis and development of business requirements • Establishes and manages project timelines, goals, and objectives
Requisition ID
2024-145425
Telecommute Options
No remote/telework allowed
Job Locations US-AZ-Fort Huachuca
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 1:05 PM)
Responsibilities include, but are not limited to: • Utilize off ensive toolsets such as Metaspolit and Kali Linux to safely analyze and penetration test production networks and systems, documenting steps and procedures to produce usable vulnerability assessments for the customer • Identify and investigate vulnerabilities, asses exploit potential, and document findings and remedies for presentation to facilitate mitigations on customer systems • Perform planning, execution, and documentation of penetration testing missions in accordance with Red Team methodologies • Perform web application testing using tools such as Burp Suite, Zap Proxy, Skipfish and Nikto, and open source toolsets • Travel to customer sites to perform network security evaluations, penetration tests, and brief customers on findings • Perform daily cyber threat research and present findings to the organization to maintain knowledge of current adversary tactics, techniques and procedures and how to apply them. Brief staff and leadership on these findings • Perform open-source intelligence gathering to prepare for missions • Write reports of vulnerabilities to increase customer situational awareness and improve the customer’s cyber security posture • Assist all sections of the Defensive Cyber Operations team as required in performing Analysis, System Administration, and other duties asassigned • Contribute to the design, development and implementation of countermeasures, system integration, and tools specific to Cyber and Information Operations • Write reports of remotely exploitable vulnerabilities to increase customer situational awareness and improve the customer’s cyber security posture • Prepare and present technical reports and briefings
Requisition ID
2024-145424
Telecommute Options
No remote/telework allowed
Job Locations US-AZ-Fort Huachuca
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 1:09 PM)
Responsibilities include, but are not limited to: • Identify and investigate vulnerabilities, asses exploit potential, and document findings and remedies for presentation to facilitate mitigations oncustomer systems • Perform daily cyber threat research and present findings to the organization to maintain knowledge of current adversary tactics, techniques andprocedures and how to apply them. Brief staff and leadership on these findings • Evaluate system security configurations, identify intrusion, identify incident method, and perform root cause analysis on intrusions • Perform analysis of complex software systems to determine both functionality and intent of software systems • Resolve highly complex malware and intrusion issues • Contribute to the design, development and implementation of countermeasures, system integration, and tools specific to Cyber and Information Operations • Create analytics with a SIEM to identify patterns, anomalies, and compromising indicators to alert Cyber Incident responders • Prepare and presents technical reports and briefings • Perform documentation and vetting of identified vulnerabilities for operational use • Assist all sections of the Defensive Cyber Operations team as required in performing analysis • Travel to customer sites to perform network security evaluations • Write reports of vulnerabilities to increase customer situational awareness and improve the customer’s cyber security posture
Requisition ID
2024-145423
Telecommute Options
No remote/telework allowed
Job Locations US-AZ-Fort Huachuca
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 1:06 PM)
Responsibilities include, but are not limited to: • Leads and participates in the evaluation and analysis of complex malicious code through the utilization of tools, including dissemblers, debuggers, hex editors, un-packers, virtual machines, and network sniffers • Responsible for providing findings in a technical report with details of the malware, identification parameters, advanced capabilities, and mitigation strategies • Conducts research in the area of malicious software, vulnerabilities, and exploitation tactics • Requires experience with application security, network security, reverse engineering, or malware • Requires strong knowledge of worms, viruses, Trojans, rootkits, botnets, Windows internals, and the Win32 API • Extensive experience required in programming (assembly and web) and system analysis with various tools, including IDA Pro, Ollydbg, PCAP tools, or TCP Dump
Requisition ID
2024-145422
Telecommute Options
No remote/telework allowed
Job Locations US-VA-Arlington
Requisition Post Information* : Posted Date 2 weeks ago(4/11/2024 6:16 PM)
Peraton is seeking a Senior Cyber Analyst - Team Lead to become part of Peraton’s Department of State (DoS) Diplomatic Security Cyber Mission (DSCM) program providing leading cyber and technology security experience to enable innovative, effective and secure business processes.   Location: Rosslyn, VA.  Hybrid - See below:  Our customer requirement requires every employee to be on-site for approx. 90 days or until on-boarding is completed and Telework is approved. After the on-boarding period, a hybrid schedule may be offered.   In this role, you will:  - Perform consolidated and comprehensive information and intelligence analysis of threat data obtained from classified, proprietary, and open source resources to provide indication and warnings of impending attacks against information systems and personnel. - Analyze and report on unique attack vectors, emerging cyber threats, and current trends used by malicious actors. - Perform cyber and technical threat analyses of foreign countries, hacker groups, terrorist organizations and other entities with capabilities that could pose potential harm. - Assess the cyber threat environment for US Missions worldwide. - Provide cyber security guidance to personnel on threats to external accounts (e.g. employee personal accounts, official social media, etc.). - Provides supervisory guidance to team members, in accordance with customer and leadership objectives: - Allocate and manage contract resources. - Manage analysts’ day-to-day schedules, delegate tasks, and communication of goals. - Manage project/product progress and ensure metrics are met and reported. - Facilitate training and provide coaching to team members to fill in skill set gaps. - Identify training requirements and develop internal/external training plans. - Represent the team, and advocate for the team’s needs and additional resources - Ensures timely completion of tasks and quality of products and deliverables. #DSCM
Requisition ID
2024-145420
Telecommute Options
Flexible for occasional telework
Job Locations US-AZ-Fort Huachuca
Requisition Post Information* : Posted Date 3 weeks ago(4/3/2024 1:14 PM)
Responsibilities include, but are not limited to: • Analyzes, maps, protects, or discovers vulnerabilities, intrusions, and threats in various computer network systems • Conducts computer and/or network security, target development, and understands all aspects of computer/network security to include firewall administration, encryption technologies, and network protocols • Reports events or incidents that occur to mitigate immediate and potential network and host threats • Perform Incident Response through analysis of malicious data-sets and publicly known exploits or vulnerabilities for the creation of custom detection and prevention methods. Perform log analysis and event correlation to identify anomalous traffic. Upon discovery of anomalous traffic, initiate incident response in accordance with the Cyber Incident Response Plan (CIRP). • Perform computer forensics to assistance with internal investigations in accordance with DoD standards and industry best practices • Provide cyber threat summaries, to include all incident response activities directly affecting CND or supporting activities. • Monitor other service, DOD, and industry Computer Emergency Response Teams (CERT) Alerts, Warnings and Advisories, and use information gathered to protect associated systems
Requisition ID
2024-145417
Telecommute Options
No remote/telework allowed
Job Locations US-AZ-Fort Huachuca
Requisition Post Information* : Posted Date 7 days ago(4/18/2024 2:50 PM)
Responsibilities include, but are not limited to: • The Regional Cyber Center – Conus (RCC-C) program is seeking a Deupty Program Manager to assist on leading the Department of Defense Information Networks (DoDIN) and Defensive Cyber Operations(DCO) teams in Fort Huachuca, Arizona. • The RCC-C pushes the boundaries of innovation and security, while providing high availability network services for the Army to accomplish its mission in the U.S. • The Deputy PM assists the PM in providing day-to-day program direction, ensuring quality stanpjtdards, program tracking, and technical and analytic guidance to program team. As principal representative, you will also provide status updates to the Government on the program. • Provide management, administrative, and technical interface with Government personnel in the day-to-day accomplishment of support services • Directly contribute to program efforts in several areas, including cost management/avoidance, schedule estimation and tracking, contract performance management, risk management, requirements analysis, and quality assurance activities. • Ensure proper performance of tasks necessary to ensure the most efficient and effective execution of the contract. • Utilize expert communication skills needed to direct the skilled technical resources and report on the technical progress, issues, and problem areas, as well as write and review technical documents. • Allocate resources (staffing, facilities, and budgets) on the contract • Review and approve all earned value, Estimate To Complete, Funds and Man-hour Expenditure Report, or other financial reports as appropriate • Review all financial and technical reports before release to the Government • Communicate issues and solutions to the Government PM in a timely and transparent manner • Ensure compliance with all regulatory and administrative requirements imposed by the contract in coordination with the Contractor's contracts staff
Requisition ID
2024-145409
Telecommute Options
No remote/telework allowed
Job Locations US-AZ-Fort Huachuca
Requisition Post Information* : Posted Date 3 weeks ago(4/2/2024 2:08 PM)
Responsibilities include, but are not limited to: • The Regional Cyber Center – Conus (RCC-C) program is seeking a Program Manager to lead the Department of Defense Information Networks (DoDIN) and Defensive Cyber Operations(DCO) teams in Fort Huachuca, Arizona. • The RCC-C pushes the boundaries of innovation and security, while providing high availability network services for the Army to accomplish its mission in the U.S. • The Program Manager provides day-to-day program direction, ensuring quality standards, program tracking, and technical and analytic guidance to program team. As principal representative, you will also provide status updates to the Government on the program. • Provide management, administrative, and technical interface with Government personnel in the day-to-day accomplishment of support services • Directly contribute to program efforts in several areas, including cost management/avoidance, schedule estimation and tracking, contract performance management, risk management, requirements analysis, and quality assurance activities. • Ensure proper performance of tasks necessary to ensure the most efficient and effective execution of the contract. • Utilize expert communication skills needed to direct the skilled technical resources and report on the technical progress, issues, and problem areas, as well as write and review technical documents. • Allocate resources (staffing, facilities, and budgets) on the contract • Review and approve all earned value, Estimate To Complete, Funds and Man-hour Expenditure Report, or other financial reports as appropriate • Review all financial and technical reports before release to the Government • Communicate issues and solutions to the Government PM in a timely and transparent manner • Ensure compliance with all regulatory and administrative requirements imposed by the contract in coordination with the Contractor's contracts staff
Requisition ID
2024-145408
Telecommute Options
No remote/telework allowed
Job Locations US-VA-Chantilly
Requisition Post Information* : Posted Date 2 weeks ago(4/11/2024 4:39 PM)
Responsible for supporting operational elements as a desk officer; providing research and analysis in furtherance of the objective to acquire intelligence; and using client-specific databases to conduct multiple layers of research and to write and coordinate guidance and official correspondence. Also responsible for applying advanced knowledge of intelligence priorities, authorities, trade craft, and operations for general case management and assessment of CI risk; objectively reviewing on-going and potential operations to identify solutions, technical tools and capabilities, and resources for advancing operational priorities, campaigns, initiatives, and activities; and coordinating U.S. Government and partner efforts.  Must have personal integrity; exhibit initiative, creativity, and flexibility; apply interpersonal, communications, and problem-solving skills; and demonstrate ability to collaborate, build a network of IC relationships, and continually learn. 
Requisition ID
2024-145391
Telecommute Options
No remote/telework allowed
Job Locations US-TX-San Antonio
Requisition Post Information* : Posted Date 3 weeks ago(4/1/2024 9:49 AM)
Analyzes user’s requirements, concept of operations documents, and high level system architectures to develop system requirements specifications. Analyzes system requirements and leads design and development activities. Guides users in formulating requirements, advises alternative approaches, and conducts feasibility studies. Provides technical leadership for the integration of requirements, design, and technology. Incorporates new plans, designs and systems into ongoing operations. Develops technical documentation. Develops system Architecture and system design documentation. Guides system development and implementation planning through assessment or preparation of system engineering management plans and system integration and test plans. Interacts with the Government regarding Systems Engineering technical considerations and for associated problems, issues or conflicts. Ultimate responsibility for the technical integrity of work performed and deliverables associated with the Systems Engineering area of responsibility. Communicates with other program personnel, government overseers, and senior executives.
Requisition ID
2024-145385
Telecommute Options
No remote/telework allowed
Job Locations US-MD-Fort Meade
Requisition Post Information* : Posted Date 3 weeks ago(4/2/2024 9:41 AM)
Peraton is currently seeking to hire an experienced Operational Assessments Analyst for the USCYBERCOM program located at Fort Meade, MD.   Operational assessments provide the Commander with the current state of the operational environment, the progress of the campaign or operation, and recommendations to account for discrepancies between the actual and predicted progress. To adequately fulfill mission requirements, CNMF requires dedicated personnel to develop and execute the CNMF assessment process to collect data that will inform current and future defensive and offensive cyber operations.    In this role you will: - Provide assessments support for intelligence and cyberspace operations conducted by JTF ZERO. - Conduct assessments to include assisting with developing Measures of Effectiveness (MOEs) and associated indicators and analyzing and updating intelligence to assess J3 operational effectiveness. - Maintain a repository Measures of Effectiveness (MOEs) and indicators with metric results. - Incorporate value added metrics into the CNMF JTF ZERO operational assessment process to inform USCYBERCOM assessments process and required deliverables. - Analyze, report, and develop recommendations on data related to operational assessments. - Continuously monitor/provide assessment updates for current ops to inform status of those operations. - Evaluate operations against MOEs to determine progress relative to mission objectives and outcomes. - Develop recommendations and guidance for improvement in the operation and operational assessments process to help drive the Commander’s decision cycle. - Perform ad hoc tasks in execution of Commander's Cyber Mission assessment priorities.
Requisition ID
2024-145372
Telecommute Options
No remote/telework allowed
Job Locations US-MD-Fort Meade
Requisition Post Information* : Posted Date 3 weeks ago(4/2/2024 9:42 AM)
Peraton is currently seeking to hire an experienced Strategic Initiative Planner for the USCYBERCOM program located at Fort Meade, MD.   In this role you will: - Execute strategic planning to support realization of Cyber National Mission Force (CNMF) Command team priorities. - Develop POAM and monitors status for realization of the command’s strategic “Road Map.” - Draft guidance for implementation of OSD, USCYBERCOM and other high-level directives for cyberspace national strategy, policy and guidance. - Manage engagements, materials, and information for senior CNMF leadership interactions with Combatant Command (CCMD) senior leadership other key partners and stakeholders. - Coordinate CNMF leadership communications across subordinate J-Directorates and the Executive Aide Staff in order to ensure the intent, messages and themes for CNMF are synchronized, harmonized, clear and consistent. The goal is command communications “with one voice.” - Coordinate inputs and craft presentations, papers, and materials IAW CNMF senior leadership direction for command projects, proposals and initiatives. - Coordinate with USCYBERCOM staff to coordinate and complete administrative and operational HHQ’s taskings. - Remain conversant with vision, mission and intent of CNMF Commander and issues considered by the Service and functional-area Joint Force Headquarters-Cyber (JFHQ) commands. - Perform other ad hoc tasks in execution of Command Team cyber mission priorities as required.
Requisition ID
2024-145369
Telecommute Options
No remote/telework allowed
Job Locations US-MD-Fort Meade
Requisition Post Information* : Posted Date 3 weeks ago(4/2/2024 9:42 AM)
Peraton is currently seeking to hire an experienced Strategic Initiative Planner for the USCYBERCOM program located at Fort Meade, MD.   In this role you will: - Execute strategic planning to support realization of Cyber National Mission Force (CNMF) Command team priorities. - Develop POAM and monitors status for realization of the command’s strategic “Road Map.” - Draft guidance for implementation of OSD, USCYBERCOM and other high-level directives for cyberspace national strategy, policy and guidance. - Manage engagements, materials, and information for senior CNMF leadership interactions with Combatant Command (CCMD) senior leadership other key partners and stakeholders. - Coordinate CNMF leadership communications across subordinate J-Directorates and the Executive Aide Staff in order to ensure the intent, messages and themes for CNMF are synchronized, harmonized, clear and consistent. The goal is command communications “with one voice.” - Coordinate inputs and craft presentations, papers, and materials IAW CNMF senior leadership direction for command projects, proposals and initiatives. - Coordinate with USCYBERCOM staff to coordinate and complete administrative and operational HHQ’s taskings. - Remain conversant with vision, mission and intent of CNMF Commander and issues considered by the Service and functional-area Joint Force Headquarters-Cyber (JFHQ) commands. - Perform other ad hoc tasks in execution of Command Team cyber mission
Requisition ID
2024-145367
Telecommute Options
No remote/telework allowed
Job Locations US-MD-Silver Spring
Requisition Post Information* : Posted Date 1 month ago(3/27/2024 5:27 PM)
Peraton Labs delivers innovative solutions and revolutionary new capabilities to solve the most difficult and complex challenges for government agencies, utilities, and commercial customers. With a distinguished heritage tracing back to Bell Labs, Bellcore, and Telcordia, our experts pave the way. Peraton Lab’s cybersecurity research protects mission-critical systems and national cyber infrastructure through a broad range of initiatives in computer network defense, secure-by-design techniques and cyber operations and experimentation platforms.   Our projects span several areas of interest.  Our core competencies include (but are not limited to):  - Program analysis, including program understanding, vulnerability identification, and remediation  - Malware analysis and reverse engineering  - Resilient networking in support of cyber mission goals  - Software-defined networking for cyber defense and deception  - Artificial intelligence (reasoning, probabilistic inference, machine learning)
Requisition ID
2024-145342
Telecommute Options
Flexible for occasional telework
Job Locations US-MD-Fort Meade
Requisition Post Information* : Posted Date 4 weeks ago(3/28/2024 9:14 AM)
Peraton is hiring an Operations Requirements Analyst to join our Cyber Mission business unit in Fort Meade, Maryland. As an Operations Requirements Analyst on our team, you will support one of the largest enterprise-wide engineering contracts within the Intelligence Community. This is a full-time position requiring 1880 hours of support per year; and work is performed at a customer location. As an Operations Requirements Analyst on our team, you will provide technical direction in national and tactical cryptologic capabilities. You will facilitate requirements gathering by coordinating technical exchange meetings (and other meetings as needed) with the Services, Combat Support Agencies (CSAs), systems engineers, data modelers, and other members of the requirements team. You will also provide comprehensive definition and documentation updates for deliverables and coordinate with analysts, managers, and seniors within Unified Cryptologic System (UCS) to verify operational requirements to assist a customer who advocates and facilitates interoperability, commonality, modernization, and integration with the US SIGINT System. 
Requisition ID
2024-145341
Telecommute Options
No remote/telework allowed