- Design, deliver, and optimize VDI Services to improve security, availability, performance, and resource utilization
- Review current VDI infrastructures, architectures, designs, and operations to identify potential improvements for optimizing system performance
- Document security, configuration, and performance benchmarks of VDI services
Peraton is seeking a Knowledge Transistion Lead to support multiple program startups companywide. Knowledge Transfer (KT) is a critical component of a successful program startup by enabling business continuity through effective risk mitigation of knowledge loss due to personnel transitions​. Peraton’s Knowledge Transfer framework is centered on the identification, capture and retention of mission-critical knowledge in the form of people, processes, and documents. This position will fill the critical role of the Knowledge Transition Lead who has responsibility to guide the transition team through the KT framework during program startup. In between program startup and transitions, there will be opportunities to develop management and transition solutions in response to customer request for proposals (RFPs).
Responsibilities:
- Work in collaboration with the Transition Executive to lead Peraton, teaming partners, and incumbent resources to execute the Peraton Knowledge Transfer (KT) methodology as part of an overall program startup and transition
- Serve as a knowledge management specialist to create, develop, implement, and maintain a knowledge management program in line with the customer knowledge management guidance
- Enable collaboration of operational data to provide account and transition leadership with relevant information to make informed decisions
- Facilitate knowledge transfer and operational readiness planning with Peraton, incumbent, and customer leadership
- Lead knowledge transfer sessions for customers and stakeholders both virtually and in-person
- Integrate information to facilitate easy access, sharing, and dissemination
- Promote and enable use of internal knowledge management tools
- Create, develop, implement, and maintain repeatable knowledge management best practices and processes
- Contribute to Peraton growth by developing management and transition solutions in accordance with customer requirements. 
- Define the overall solution approach, resources, costs, and risk handling. Describe the solution as part of the proposal response in a way that gives the customer confidence our approach will meet their requirements at an optimal price and with low risk
Peraton Labs delivers innovative solutions and revolutionary new capabilities to solve the most difficult and complex challenges for government agencies, utilities, and commercial customers. With a distinguished heritage tracing back to Bell Labs, Bellcore, DHPC, and Telcordia, our experts pave the way.
As a Program Management Analyst, you will:
- Be responsible for the successful technical, schedule, and cost performance of a major program, or multiple programs, through subordinate program/project managers, in accordance with contract requirements and company policies, procedures and guidelines.
- Develop and monitor cost, schedule, and staffing plan throughout the life of the program.
- Review and submit project deliverables, status reports, and presentations to ensure quality and adherence to internal and government standards and ensure all contractual reporting is on time, accurate, and up-to-date.
- Work with recruiters and program personnel for requisitions development, management and interview coordination and skills verification of potential employees.
- Manage relations with sub-contractors for submission and execution of Sub-K labor, materials, ODC’s and other programmatic contractual requirements.
- Provide metrics for reporting to the program manager, the PMO director, and customers using MS Excel and other tools.
- Manage the procurement of materials as required by the customer.
-
Oversee recruitment process including sourcing, vetting, training and placement of qualified candidates
-
Participate in on-boarding and off-boarding of project team members, coordinating start dates, crossovers, security briefings, departure dates, departure paperwork etc.
-
Perform tasks requiring the collection, evaluation, and data analysis on official documents, records, forms, reports, plans, policies, and regulations as needed.
- Other duties as assigned.
- Perform storage engineering design for periodic data center, storage, and remote site server hardware refreshes
- Recommend hardware solutions compatible with existing Storage technologies
- Document data center physical hardware designs including row, rack, bay, Interconnections, power, network, storage, serial numbers, lifecycle, and supporting service information
- Create and document requisite storage configuration settings
- Design and engineer a long-term storage solution to meet records management requirements
- Deliver service catalog items for automatically provisioning storage to deliver Infrastructure-as - Code
Peraton Labs delivers innovative solutions and revolutionary new capabilities to solve the most difficult and complex challenges for government agencies, utilities, and commercial customers. With a distinguished heritage tracing back to Bell Labs, Bellcore, and Telcordia, our experts pave the way. Peraton Lab’s cybersecurity research protects mission-critical systems and national cyber infrastructure through a broad range of initiatives in computer network defense, secure-by-design techniques and cyber operations and experimentation platforms.
What You'll Get to Do:
- Implement, test and operate user interfaces for hardware software integration applications
- Perform on-going code review and implementation enhancements to improve software usability and robustness
- Troubleshoot and debug issues that arise
- Provide engineering designs for new software solutions
- Contribute to all levels of the architecture
- Maintain technical documentation
- Consult team members on secure coding practices
- Develop a familiarity with new tools and best practices
- Design, deliver, and optimize Infrastructure Services to improve security, availability, performance, and resource utilization in the data centers
- Review current infrastructures, architectures, designs, and operations to identify potential improvements
- Analyze, refine, and document the requirements for transition from legacy hardware into modern data center infrastructure environment
- Design and build host & tenant environment with security hardened configuration for infrastructure services and design ongoing maintenance practices and procedures for infrastructure hosted service patching and updates
- Design virtual Infrastructure services to maximize available capacity of physical compute, storage, and network hardware resources
- Document security, configuration, and performance benchmarks of Infrastructure Services
- Design production infrastructure services that support highly available, private cloud, active-active data center operations, within the constraints of the environment
- Design practices, procedures, Automation and Orchestration to provision, de-provision, and entitle Compute, Storage, and Network resources
- Identify infrastructure security-relevant actions, tests, and key performance indicators for Information Dashboard and Reporting
- Design Service Catalog Items for Infrastructure Services for business and IT technical services
- Design, deliver, and optimize Infrastructure Services to improve security, availability, performance, and resource utilization in the data centers
- Review current infrastructures, architectures, designs, and operations to identify potential improvements
- Analyze, refine, and document the requirements for transition from legacy hardware into modern data center infrastructure environment
- Design and build host & tenant environment with security hardened configuration for infrastructure services and design ongoing maintenance practices and procedures for infrastructure hosted service patching and updates
- Design virtual Infrastructure services to maximize available capacity of physical compute, storage, and network hardware resources
- Document security, configuration, and performance benchmarks of Infrastructure Services
- Design production infrastructure services that support highly available, private cloud, active-active data center operations, within the constraints of the environment
- Design practices, procedures, Automation and Orchestration to provision, de-provision, and entitle Compute, Storage, and Network resources
- Identify infrastructure security-relevant actions, tests, and key performance indicators for Information Dashboard and Reporting
- Design Service Catalog Items for Infrastructure Services for business and IT technical services
Every day, Peraton’s 18,000 employees do the can’t-be-done, solving the most daunting challenges facing our customers. Join us in supporting our country’s intelligence mission as a Software Engineer supporting the Data Ingest Team.
In this role, you will work with a small talented team working with BIG DATA. You will implement complex data parsers for a variety of structured and unstructured data sets to render them in a format recognized by a host of analytical tools. You will work primarily in Python but knowledge of Java and Perl is valuable. You will automate certain bulk data processing using Apache NiFi and other technologies. As part of the program’s process improvement program you will refactor legacy code to improve speed and efficiency of production processing. You will research new technology to develop innovative new methods for extracting and transforming the huge flows of data received and ingested daily. Most importantly, in this position you will play an essential role in keeping our country safe. Join us!
Ready to make an impact? Peraton has an exciting opportunity for a cleared Satellite Ground Terminal Operator to join our dynamic multi-disciplinary team, developing a next generation satellite terminal on a mission critical Space and Intelligence Program.
The Satellite Ground Terminal Operator will be responsible for the following but not limited to:
- Supports 24x7 operations and management for a system of satellite Command & Control (C2) antennas
- Coordinates with satellite owner/operators to provide real-time operational status reporting and, resolve issues, and support anomaly resolution activities
- Establishes and maintains an up-to-date and complete picture of activities to include satellite command and control operations, schedules, system status, and system availability
- Detects, records, and supports the isolation of system failures
- Ensures proper network capability via secure data transmission services
- Coordinates factory support, recurring maintenance, and compliance inspections
- Expert level with a complete understanding and wide application of technical principles, theories and concepts
- Working under only general direction, provides technical monitoring to a wide range of difficult problems. Independently determines and develops approach to solutions
**This role will be working a non-rotating 8-hour shift schedule supporting a dynamic 24/7 operational environment. Occasional work may be required outside those times**
The Network Engineer is responsible for:
- Respond to higher level systems and networking alerts, triage, troubleshoot, and resolve incidents.
- Work closely with other support teams to ensure incident events are handled in a timely manner.
- Handle incoming technical escalations from Service Desk, Network Operations Security Center, and other support teams.
- Draft and send incident notifications to government stakeholders and other support teams.
- Monitor and perform health checks of networking devices critical to infrastructure including routers, switches, VPNs, and proxies.
- Document, track, and coordinate incidents in Remedy.
- Escalate unresolved issues to Tier IV.
- Join troubleshooting bridge calls for major incidents.
- Perform Tier III-level administration tasks to fulfill pre-defined requests and tasks such as port activations and de-activations.
- Perform patching, updates, upgrades and other maintenance activities.
- Communicate directly with end-users as necessary, to resolve issues and complete requests.
- Assist with postmortem related activities and support various efforts related to operational improvements.
- Based on recommendations from management, implement new and improved processes, change processes, perform new tasks, create reports, and address ad-hoc requests.
- Contribute to documentation in the Knowledge Base, Standard Operating Procedures (SOP), work instructions, and job aids.
- Continuously cross-train to also support systems administration.
- Perform a Plans implementation of enhancements and upgrades to the network. Advises network users of hardware requirements, configurations, and limitations.
- Maintains technical expertise in all areas of network and computer hardware and software interconnection and interfacing, such as routers, multiplexers, firewalls, hubs, bridges, gateways, etc.
- Evaluates and reports on new communications technologies to enhance capabilities of the network.
- May be assigned responsibility for the management of the systems administration function, including associated staff.
- Additional duties as assigned.
Peraton is a critical partner to the Intelligence Community, Department of Defense, and select federal agencies and commercial entities, providing innovative, reliable solutions to the nation’s most sensitive and mission-critical programs and systems. We are recognized as a trusted provider of highly differentiated space, intelligence, cyber, defense, homeland security, and communications capabilities. Our scientific discovery and research empower our employees and help our government keep America and our allies secure. All of this is possible due to the human insight and ingenuity of our most important asset, our employees. We are looking for a Microsoft Full Stack BI Developer in support of Treasury’s Enterprise Data Management (EDM) program.
Enterprise Data Management (EDM) is looking to add an experienced Microsoft Full Stack Business Intelligence (BI) Developer to support their Federal team resources in a number of areas. The prime areas of responsibility include ETL, SQL Development, Azure Development and System Administration, programming to include R and Python, data integration and support with the EDM Analytics Gateway. This resource should be someone who takes initiative with little direction and is adept at problem solving and troubleshooting. This person mustt be available to provide scheduled and ad hoc evening and weekend support
What you will do:
- Data Integration Support – MS SQL Server technology (SSAS, SSRS, SSIS, and SSMS)
- Developing/Automating Extract, Transform, and Load (ETL) SSIS packages
- Developing/Updating Tabular model and data warehouse
- Assisting/Supporting user access
- EDM Analytics Gateway Support – In addition to SQL server technology, the Contractor must be familiar using R Studio, Python, and other data analytical tools
- Providing user support getting access to the system
- Building/adding additional capabilities to its self-service offering
- Configuring, updating, and upgrading tools available in EDM Analytics Gateway
- Other duties may include but are not limited to:
- Developing/Updating Tabular model and data warehouse
- Support of the EDM SaaS and PaaS Azure migration
- Report conversion from SQL to Azure BI
- Building/adding additional capabilities to the EDM Analytics Gateway self-service offering
- Involvement with data requirements gathering process
- Employ proactive and strategic approaches to design to cultivate synergies between standards, models and methodologies
- Enterprise Power BI dashboard development for dashboards hosted on an on-premises Power BI Dashboard Manager Website
- Must be able to collaborate affectively with customers to develop clear and achievable Dashboard and Report requirements
- SSRS Report development or R and Python scripting experience is a plus
- Data ingestion via on-premises SSIS ETL processing performing development in Visual Studios SSDT
- Data storage via SQL Database Engine, utilizing T-SQL to create views and stored procedures
- Data modeling via SSAS Tabular Models, with an understand of both star and snowflake model schemas
- Conduct any necessary testing and validation requirements
- Troubleshoot dashboard and BI System issues and provide user support.
- Maintain high levels of customer satisfaction and work effectively with employees, subcontractors, and the Treasury staff in a diverse team environment
Peraton is looking for a Senior Software Engineer to work on site in King George, VA.
This position will be located at our Defense Mission and Health Solutions Sector in King George, VA. The qualified candidate will become part of Peraton’s Naval Surface Warfare Center, Dahlgren Division (NSWCDD), Weapons Control and Integration Department (H), Maritime Warfare Control Systems Division (H20) services program. The H20 program specializes in providing engineering services and infrastructure services for the development of Maritime Command and Control systems, Warfare/Weapons Control systems, and future warfare development for the United States Navy. H20 supports programs/systems such as: Littoral Combat Ship (LCS) Mission Package (MP) Software; Vertical Launching Systems (VLS); AN/SQQ-89, Undersea Warfare (USW)/Anti-Submarine Warfare (ASW) Combat Systems (USWCS/ASWCS); Aegis Weapons & Fire Control; Autonomous and Unmanned Systems; Electromagnetic Maneuver Warfare (EMW); Information Warfare/Big Data; Machine Learning; Artificial Intelligence (AI); and Next Generation ESSM Launching System (NGELS).
Roles and Responsibilities:
- Provide software development technical expertise related to current software technologies including open systems development, software implementations on Linux and Unix operating systems, VxWorks, service oriented architectures, model based software development tools, and use of Commercial Off the Shelf (COTS) products to supplement supported system requirements.
- Apply Cyber-security programming expertise, programming languages such as C++, C#, Java, Unified Modeling Language (UML)/Systems Modeling Language (SysML), and Real-time programming to meet system requirements.
- Apply appropriate standards, processes, procedures, and tools throughout the development life cycle.
- Develop software on diverse platforms including UNIX, Linux, VxWorks and Windows based operating systems.
- Utilize configuration management tools, database applications and related software development tools.
- Understand of the software development lifecycle and roles within each phase to include a variety of programming and scripting languages, and complex software design principles.
- Perform requirements analysis, design, develop, document, test, and debug software that contain logical and mathematical solutions to mission problems.
Determines supply requirements from authorization documents or other media. Maintains manual and automated records for requisitioning, receiving and storing supplies, repair parts and equipment. Determines sources of supply and shipping modes. Inspects and reports on supply and shipping shortages. Interprets and prepares supply and transportation documentation. Performs data entry to query and enter information for supply, acquisition and inventory purposes. Researches and identifies parts and materials from electronic equipment and component vendors and enters information into procurement database. Records, maintains and initiates purchase order documentation for acquisition of component items. Pulls and stages equipment for shipment to various sites and prepares the necessary paperwork. Maintain records to account for items shipped. The employee may frequently be required to stand; walk; and use hands to finger, handle, or feel objects, tools, or controls. The employee is required to reach with hands and arms. The employee must lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision and distance vision.
- Provide full-service cradle to grave desktop and server management support across the enterprise.
- Provide both site specific and remote support of network services for the resolution of technical problems.
- Maintain network stability through advanced troubleshooting, timely resolution of incidents, and proactive maintenance to provide the maximum availability and optimal Mean Time to Repair.
- Review system and network configurations to ensure successful implementation of services into production.
- Support software and hardware refreshes and associated trouble-shooting efforts.
- Provide mission systems support running a variety of operating systems, including Linux and Solaris VMware administration for configuration, maintenance, monitoring, and overall support of multiple VMware environments
- Maintain and restore VM backups and snapshots.
- Update system process documentation, guides, diagrams, and SOPs as needed.
- Perform routine and preventative maintenance such as general computer tasks, backup/restore, application loads, disk utilization, system loading and monitoring
- Detect, isolate, document, quickly report, and resolve system outages or problems encountered during operations of the operational system baseline
- Collect diagnostic data describing the environment at the time of the failure, restore system operation, develop workarounds, and other activities necessary for recovery of a system
- Support system engineering as required for ongoing analysis and integration efforts
- Coordinate IT system installations, maintenance, and upgrades
- Implement and support incident and problem management; provide metrics data to determine trends; and recommend actions to improve performance
- Provide full-service cradle to grave desktop and server management support across the enterprise.
- Provide both site specific and remote support of network services for the resolution of technical problems.
- Maintain network stability through advanced troubleshooting, timely resolution of incidents, and proactive maintenance to provide the maximum availability and optimal Mean Time to Repair.
- Review system and network configurations to ensure successful implementation of services into production.
- Support software and hardware refreshes and associated trouble-shooting efforts.
We are seeking a NOC Supervisor to support a network providing monitoring and incident management services to our U.S. Navy Customer on site at Arlington, VA and the Washington Navy Yard, DC.
What will you do:
- Supervise a network operations team of 9-12 members who will proactively monitor and investigate network outages on the Navy Public Safety Network (PSNET).
- Provide technical guidance for network outage investigations and troubleshooting.
- Supervise, organize, and direct the NOC team to ensure the stable operation of the NOC.
- Produce reports and other deliverables to customer and government stakeholders.
- Ensure the effective monitoring and response to hardware outages and network incidents.
- Coordinate and manage certain projects that fall within the NOC’s scope.
Involved in the analysis of unstructured and semi-structured data, including latent semantic indexing (LSI), entity identification and tagging, complex event processing (CEP), and the application of analysis algorithms on distributed, clustered, and cloud-based high-performance infrastructures. Exercises creativity in applying non-traditional approaches to large-scale analysis of unstructured data in support of high-value use cases visualized through multi-dimensional interfaces. Handle processing and index requests against high-volume collections of data and high-velocity data streams. Has the ability to make discoveries in the world of big data. Requires strong technical and computational skills - engineering, physics, mathematics, coupled with the ability to code design, develop, and deploy sophisticated applications using advanced unstructured and semi-structured data analysis techniques and utilizing high-performance computing environments. Has the ability to utilize advance tools and computational skills to interpret, connect, predict and make discoveries in complex data and deliver recommendations for business and analytic decisions.
Peraton is seeking a Systems Engineer, Senior (III) to support Cyber Mission in Annapolis Junction, MD.
The System Engineer III will:
Analyzes user’s requirements, concept of operations documents, and high level system architectures to develop system requirements specifications
Analyzes system requirements and leads design and development activities
Guide users in formulating requirements, advises alternative approaches, and conducts feasibility studies
Provide technical leadership for the integration of requirements, design, and technology. Incorporates new plans, designs and systems into ongoing operations
Develop technical documentation. Develops system Architecture and system design documentation. Guide system development and implementation planning through assessment or preparation of system engineering management plans and system integration and test plans.
Interact with the Government regarding Systems Engineering technical considerations and for associated problems, issues or conflicts
Assume responsibility for the technical integrity of work performed and deliverables associated with the Systems Engineering area of responsibility
Communicate with other program personnel, government overseers, and senior executives
Peraton is seeking a Senior Software Developer to be part of a cutting edge, mission focused team supporting the Deep Space Network (DSN) in Monrovia, CA.
As a senior software developer, you will be designing solutions, and developing capabilities to support DSN mission requirements. Working in an agile development environment, you will work with the customer to identify needs, translate those needs into actionable requirements, and work with a team of skilled software developers to turn concept specifications into reality.
If the thought of working with skilled individuals and customers in a dynamic environment, turning problems into solutions, and making an impact on a daily basis is motivating to you, please join us and be part of Deep Space Exploration.
Responsibilities:
- Participate in the research, recommendations, and architecture discussions that contribute to the overall DSN Project Office vision; document client requirements, system architectures, test plans, and test cases
- Design, develop, evaluate and modify systems and systems-oriented tools and products including development of computer-based tools and other tools for data collection, analysis and reporting.
- Provide a timetable and schedules for all development, test and maintenance tasks.
- Work with the development team to verify and validate any and all changes to the system and ensure that requirements are being met, troubleshoot test and production issues, and support system upgrades.
- Develop and document operational processes and procedures and disseminate the information or procedures to the DSN.
- Follow software and engineering best practices and customer processes
Provides intelligence support for contingency operations, battle staff and operational-level planning, Joint and multi-lateral training exercises, and strategic engagement policy throughout the Areas of Operational Responsibility (AOR) and Areas of Interest (AOI). Monitors and analyzes all strategic and operational aspects of political, military, and economic developments for the countries in the AORs and AOIs. Assesses future and on-going political-military developments, military capabilities and doctrine, weapons acquisitions, and employment of military forces within each country. Researches, authors, and coordinates threat assessments to support the Commander and the other senior leadership as well. Connects pieces of information that is available from different sources like field agents and form reliable reports on anti-terrorism and national security to deal with potential threats. Assesses the believability of the information from the reliable sources, collects it and validates intelligence. May provide team leadership to other Analysts.
- Responsible for research of Publicly Available Information (PAI) by performing Persistent Horizon Scanning (PHS) of potential threats, opportunities and likely future developments including those that are at the margins of current thinking and planning.
- Horizon scanning may explore novel and unexpected issues, as well as persistent problems or trends. Performs and provides market research of technologies to track, understand, and evaluate technology evolutions, market trends, and patterns.
- Assists Prototype Initiation team in developing prototype concepts through market research technologies discovery, Concept of Operations (CONOPS), and operation views.
- Principal analyst provides analysis of all-source data in a multi-intelligence area to produce executive-level defense reports relevant on a national or global level.
- Serve as subject matter expert in the intelligence analysis field. Leads in the market research of all-source data and assists other intelligence analysts in the operation and use of intelligence tools.
- Provides expert analysis of intelligence products for potential prototyping.
- Conducts signal, imagery, and multi-source intelligence analysis.
- Provides imagery interpretation, basic plotting, map reading, image orientation for stereo viewing, identification of equipment and objects for defense analysis, and marine vessel identification.
- Uses multiple types of sensing systems, including radar and spectral imagery sources.
- Trains in one or more areas of; threat analysis, foreign intelligence, counterintelligence, risk and vulnerability assessments, military operations, investigations, technology protection, security, and antiterrorism/force protection.
Our Defense Mission and Health Solutions Sector is seeking an Application Programmer/Analyst II. This individual will serve as a part of a team developing enhancements to the Medicare Fee For Service claims processing system – Medicare Part A, Medicare Part B, and Common Working File (CWF). Responsible to create technical design deliverables, develop new programs, enhance existing programs, build unit test plans, cases, data and execute those tests. Installs changes into internal testing regions and fixes discovered defects. Follows procedures and coding standards in a highly rigorous development environment. The legacy mainframe healthcare claims processing system is being modernized. In addition to traditional mainframe work, this position could involve building and updating web APIs, as well as other cloud solutions.
Responsibilities:
- Design, codes, and unit tests enhancements to the health claims processing system.
- Participates as a member of a persistent development team.
- Completes development to implement complex components.
- Demonstrates general use and application of concepts, practices, and techniques.
- Designs, prepares, and executes unit tests and presents team to clients.
- Provides solutions to a variety of problems.
- Contributes to strategic direction for teams.
- Applies technical knowledge to provide maintenance solutions across one or more technology areas
- Applies company and 3rd party technologies to complex software solutions of moderate complexity.
- With only general direction, implements end-user or enterprise solutions of moderate complexity.
- Integrates technical expertise and business understanding to create superior solutions for clients.
- Consults with team members and other organizations, clients and vendors on complex issues.
- Provides time / resource estimates for assigned projects.
- May assist in developing innovative solutions to complex business and technology problems in areas of proven expertise.
Peraton is seeking a Satellite Communications Engineer to work as a member of an Operations and Maintenance (O&M)
crew at a field site located in Alice Springs, Australia, supporting satellite operations.
The Satellite Communications Engineer will be responsible for the following but not limited to:
- Monitoring system and subsystem operation and performance and preparing periodic status reports
- Investigating and responding to all indications of anomalous system performance
- Assisting in the preparation and review of standard operations procedures and system redundancy management documentation
- Supporting system reconfiguration and mode changes
- Supporting special system operations of a non-routine nature
- Monitoring several real-time systems and implementing procedures required for control and status of these systems in response to anomalous behavior
- Monitoring equipment health and status to ensure the highest possible level of mission readiness
- Continuous core skill improvement training
- Follow-on advanced operator training
The successful candidate will be trained with the necessary skills and knowledge required for system operations. Upon certification, the operator will continue to develop operational skills, knowledge and problem-solving experience for greater technical responsibilities or leadership opportunities with the operations organization.
- An initial 1-year tour commitment is required.
- The successful candidate must pass a comprehensive physical and psychological examination prior to beginning this assignment.
**A comprehensive overseas compensation package is offered with this position including relocation.
**This position is unaccompanied. You will be part of a team that provides provide 24/7 support. Standard work hours are 8 hour days, 5 days a week but may be asked to work outside of standard work hours.
Peraton is searching for a talented Mid-Level Penetration Tester to become part of Peraton’s Citizens Security & Public Services, State and Local Account. This position will be remote.
What you’ll do:
The Mid-Level Penetration Tester will be responsible for the following, but not limited to:
The successful candidate will perform vulnerability assessments and penetration testing following the customer’s prescribed scope statement. The ideal candidate must display familiarity with Windows and Linux Mobile operating systems and be able to conduct network and security vulnerability analysis. Specifically, the candidate will analyze internal and external systems to help assess vulnerability to compromise from adversaries. The successful candidate must have prior experience with scope defined penetration testing using mainly open-source tools.
- Experience and familiarity with the assessment methods defined in NIST SP 800-30 Rev. 1 and NIST SP 800-53A Rev. 4 (interview, examine, and test)
- Penetrate desktops, servers, applications, operating systems, and security systems to gain root/admin access
- Provide black-box, grey-box, and white-box penetration testing using tools and techniques to conduct cybersecurity evaluations for highly specialized network communication systems
- Modify open-source exploits to bypass/evade antivirus, firewalls, hardened systems, and IDS/IPS systems
- Modify computer/system/network attacks, exploits, and Metasploit modules to create variations that evade detection
- Perform reconnaissance, privilege escalation persistence, lateral movement, and payload generation for multiple targets
- Hide digital artifacts and communications to evade antivirus, firewalls, IDS/IPS systems, Wireshark, and tcpdump
- Configure phishing and smishing environments to support social engineering testing
- Work independently to analyze, research, and solve technical problems
- Leverage existing business processes and document new repeatable business processes and procedures where necessary
- Research external information on cybersecurity events, incidents, threats, and technical vulnerabilities
- Presents categorize findings and remediation actions in detailed written reports, POA&M, and presentations to customers.
Peraton is searching for a talented Senior Penetration Tester to become part of Peraton’s Citizens Security & Public Services, State and Local Account. This position will be remote.
What you’ll do:
The Senior Penetration Tester will be responsible for the following, but not limited to:
Leads the penetration test part of the assessment. Responsible for developing the testing results and remediation recommendations of the assessment report. Contributes to the planning phase of the Assessment activities. They will apply technical and professional skillsets to lead technical meetings and support the scoping section which consists of interviews with individual or group subject matter experts to complete the Rules of Engagement (ROE) activities, achieve clarification, or lead to the location of evidence. They communicate and share information gained during the planning phase with the entire assessment team. They works directly with the customer and Peraton team to successfully plan and execute the assessment, as well as notify and support the assessment services. They participate in assessment activities and perform the adversarial testing. Leads the post-execution out brief to the customer. Leads the development of the draft and final Assessment reports. Identify potential improvements to the customer organization security posture that are related to organizational system(s) use and interconnections, as well as identifying strengths and weaknesses in incident management capabilities that are applicable to protecting and sustaining the organizational system(s).
- Experience and familiarity with the assessment methods defined in NIST SP 800-30 Rev. 1 and NIST SP 800-53A Rev. 4 (interview, examine, and test)
- Penetrate desktops, servers, applications, operating systems, and security systems to gain root/admin access
- Provide black-box, grey-box, and white-box penetration testing using tools and techniques to conduct cybersecurity evaluations for highly specialized network communication systems
- Modify open-source exploits to bypass/evade antivirus, firewalls, hardened systems, and IDS/IPS systems
- Modify computer/system/network attacks, exploits, and Metasploit modules to create variations that evade detection
- Perform reconnaissance, privilege escalation persistence, lateral movement, and payload generation for multiple targets
- Hide digital artifacts and communications to evade antivirus, firewalls, IDS/IPS systems, Wireshark, and tcpdump
- Configure phishing and smishing environments to support social engineering testing
- Work independently to analyze, research, and solve technical problems
- Leverage existing business processes and document new repeatable business processes and procedures where necessary
- Research external information on cybersecurity events, incidents, threats, and technical vulnerabilities
- Presents categorize findings and remediations actions in detailed written reports, POA&M, and presentations to customers.
The Information Systems Security Engineer 1 (ISSE1) will be responsible for:
- Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of secure networking, computing, and enclave environments
- Apply knowledge of IA policy, procedures, and workforce structure to design, develop, and implement secure networking , computing, and enclave environments
- Interact with the customer and other project team members
- Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of IA architectures, systems, or system components
- Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures
- Support security planning, assessment, risk analysis, and risk management
- Identify overall security requirements for the proper handling of Government data
Peraton is seeking a Systems Administrator (SA) to join our team of qualified and diverse individuals. The qualified applicant will become part of Department of State (DOS) Consular Affairs Enterprise Infrastructure Operations (CAEIO) Program, for the Bureau of Consular Affairs (CA). This initiative is intended to provide IT Operations and Maintenance to modernize the legacy networks, applications, and databases supporting CA services globally.
The ideal candidate will work with minimal direction as a seasoned resource. Installs, configures, troubleshoots, resolve complex issues, and supports ongoing usability of desktop computers, laptops, SW/HW, and peripheral Commercial-Off-The-Shelf (COTS) / Government-Off-The-Shelf (GOTS) technology. Responsible for providing all Domestic Consular facilities with technical expertise supporting the HW/SW located at the Domestic Consular/Passport facilities.
The scope of this effort is to provide IT Operations and Maintenance support for the HW/SW platforms on which Consular Affairs (CA) IT systems reside and operate at the Passport Offices and Agencies. The SA provides support at domestic Consular facilities working closely with the Government SAs as requested. The SA shall support the ISSO and ensure that security and internal controls are handled in accordance with DOS policies and procedures. The SA shall ensure that all problems/incidents are logged into the Ticket Management System and managed in accordance with the requirements specified by the government.
Day to Day Work Responsibilities:
- The position requirements described below supports the Systems Administrator position. The candidate should have demonstrated experience working at a client site in a high stress environment and deliver measurable results.
- Provide planning, installation, training, support, monitoring and maintenance of HW (server and workstation builds) and software including all Consular Affairs applications (e.g., Active Directory accounts and passwords, System Center Configuration Manager (SCCM) and, other locally installed CA applications, etc.) security/vendor patches/updates/vSphere Installation Bundle (VIBs), and SQL databases.
- Coordinate and inform CA/CST management of all risks impacting IT related services including but not limited to, power outages, environmental changes, natural disasters (fire/flood), employee accident or deliberate acts, maintenance, or third-party vendor actions.
- Coordinate and plan for upgrades, perform monthly restores to validate user data integrity, replace HW/SW components as needed, and prepare for consolidation and decommission/retiring of HW/SW.
- Perform back-ups, restores, purges and on-going management of data, systems, software and HW.
- Monitor and document abnormal performance of server, workstation, and services trends as well as document and maintain site topology configuration and changes.
- Provide server/workstation security services.
- Provide remediation of vulnerabilities and ensure Symantec Endpoint Protection (SEP) compliance on all required devices.
- Provide all hardware and software maintenance, such as defective hard drives, servers, workstations, chip/read writers, driver license readers, barcode readers, printers, digital scanners, etc.
- Provide all Active Directory service/user account and password administration, and Active Directory user privilege administration and badge logon administration.
- Knowledge of NTFS and share permissions; distribution/security group management.
- Knowledge of DHCP, Print Server and Exchange/O365 management.
- End user software and Office application support.
- Create, maintain, track, and communicate configurations and/or changes of configurations in HW, SW, data, permissions (or security-related information), etc.
- Develop, maintain, and communicate diagrams, system configurations and technical documentation.
- Provide and ensure availability, efficiency and effectiveness of systems, SW, HW, and data as well as technical support for testing and evaluation purposes.
- Document, track and report on the support provided to the Consular facilities (inclusive of all levels of support and all Consular facilities), report and follow-up on all trouble calls.
Peraton is hiring an ERP Consultant to work on an as needed basis. This will be 100% telecommute. The individual will be resposible for the following:
- Datamine GCSS-Army data within Army Vantage, GCSS-Army, LMP, GFEBS, Advana, and other Army ERP systems
- Develop repeatable and automated processes to obtain credit given back through GFEBS when a user turn-in their serviceable and unserviceable parts
- Develop processes to automatically pull goods issued to WOs and associated costs in support of Operational Sustainment Reviews
- Automate process to obtain usage data for fleet wide analyses
- Implement QA/QC processes for work order, parts, and usage data from GCSS-Army
Peraton is seeking to fill a critical role for a full-time background investigator for our Risk Decision Group (RDG) at the Chambersburg, PA office. Applicants must reside within 30 miles from the city center of Chambersburg.
What you’ll do:
The Investigator will be responsible for the following but not limited to:
- Conducting background investigations for the purpose of determining employment suitability of persons who require access to sensitive or classified U.S. Government information
- The predominant casework is in support of the Defense Counterintelligence and Security Agency (DCSA). Casework for other contracts will be assigned based on investigator performance and business need
- Investigators will conduct face-to-face interviews with the subject and their neighbors, employers, friends, and family
- Investigators will also perform record searches at police agencies, courthouses, educational and financial institutions, and medical/mental health facilities
- Investigators report all obtained information in a clear and concise report on an issued government computer system
Perform operational tradecraft evaluations on developed tools, to include determining the behaviors and functionality of tools. The Operational Tradecraft Analyst will work with the Sponsor to determine the appropriate test set-up, execute the test, and provide an evaluation based on the test results.
Analyst job duties will include the following:
- Develop, implement, execute, and/or maintain an Independent Validation & Verification (IV&V) program to independently test, inspect, and analyze performance of Sponsor tools and applications to establish a clear understanding of delivered capability relative to user and system requirements
- Perform operational testing and end to end integration testing, CONOP validation, and ad-hoc testing to determine tool behavior and functionality
- Coordinate with operations team to develop CONOPS, build simulated environments, and test tool in simulated environment
- Coordinate with the Sponsor to develop and implement user guides for testing tools, including building testing environments
- Build accurate test scenarios (including bare metal and virtual machine), analyze anomalies and functionality of tools during simulations
- Assess& validate tools based on forensic artifacts and observations from testing
- Maintain and administer computer networks and computing environments including systems software, applications software, hardware, and configurations, and implement network security measures to protect data, software and hardware
- Troubleshoot, diagnose, and resolve hardware and software, and other network issues to perform disaster recovery and replacing hardware and software components
- Create network diagrams and documentation, and monitor and assess transport and network infrastructure protocols
- Test, configure, and troubleshoot enterprise network devices (e.g. firewalls, routers, etc)
- Coordinate with the Sponsor to document and deliver Operational Tradecraft reports in approved formats
Desired Qualifications:
- Current certification in one or more of the following or equivalent:
- Cisco Certified Network Associate (CCNA, Routing, and Switching)
- Certified Information Security Manager (CISM)
- EC-Council Certified Ethical Hacker (CEH)
- Certified Information Systems Security Professional (CISSP)
- Demonstrated experience working with/in the Intelligence Community
- Demonstrated experience with cyber operations tactics, techniques, and procedures
Perform operational tradecraft evaluations on developed tools, to include determining the behaviors and functionality of tools. The Operational Tradecraft Analyst will work with the Sponsor to determine the appropriate test set-up, execute the test, and provide an evaluation based on the test results.
Analyst job duties will include the following:
- Develop, implement, execute, and/or maintain an Independent Validation & Verification (IV&V) program to independently test, inspect, and analyze performance of Sponsor tools and applications to establish a clear understanding of delivered capability relative to user and system requirements
- Perform operational testing and end to end integration testing, CONOP validation, and ad-hoc testing to determine tool behavior and functionality
- Coordinate with operations team to develop CONOPS, build simulated environments, and test tool in simulated environment
- Coordinate with the Sponsor to develop and implement user guides for testing tools, including building testing environments
- Build accurate test scenarios (including bare metal and virtual machine), analyze anomalies and functionality of tools during simulations
- Assess& validate tools based on forensic artifacts and observations from testing
- Maintain and administer computer networks and computing environments including systems software, applications software, hardware, and configurations, and implement network security measures to protect data, software and hardware
- Troubleshoot, diagnose, and resolve hardware and software, and other network issues to perform disaster recovery and replacing hardware and software components
- Create network diagrams and documentation, and monitor and assess transport and network infrastructure protocols
- Test, configure, and troubleshoot enterprise network devices (e.g. firewalls, routers, etc)
- Coordinate with the Sponsor to document and deliver Operational Tradecraft reports in approved formats
Desired Qualifications:
- Current certification in one or more of the following or equivalent:
- Cisco Certified Network Associate (CCNA, Routing, and Switching)
- Certified Information Security Manager (CISM)
- EC-Council Certified Ethical Hacker (CEH)
- Certified Information Systems Security Professional (CISSP)
- Demonstrated experience working with/in the Intelligence Community
- Demonstrated experience with cyber operations tactics, techniques, and procedures
Peraton’s First Responder Solutions (FRS) program provides state-of-the-art Computer Aided Dispatch (CAD) solutions to a variety of first responder customers across the country and internationally. FRS is seeking an experience Technical Product Trainer to join our team, to interact with the customers directly, and will be the face of our products.
The hired individual will work with the product software development and site engineering to fully understand our product, and train our customers on our CAD software. We are looking for someone who is an excellent communicator, who will be able to collaborate cross-functionally. We are looking for someone who has a deep understanding of technical training, and experience in the public safety field.
Plans, develops, and coordinates in-house product training programs for field support personnel and customers. Obtains information needed to prepare in-house training programs; prepares training materials; develops course content; determines methodology; and coordinates the development of training aids. Conducts training sessions and develops criteria for evaluating effectiveness of training activities. May utilize trainers with technical expertise. Continuously revises lesson plans to meet new training requirements and to keep technical information up to date.
What you will do:
- Act as Training and Product subject matter expert
- Provide time/cost estimates for training and documentation
- Support planning and scheduling of training for multiple customers
- Collaborate with stakeholders and project managers
- Conduct training classes for customer trainers, end users, supervisors, field personnel (police/fire/ems), and data administrators
- Fields of training include Computer Aided Dispatch (CAD) system, data files maintenance, Management Information systems, GIS Mapping, Mobile data devices
- Oversee functional and technical training for all projects
- Develop training plans, procedures, methods, and tools for training
- Participate in design, development, implementation and testing of CAD products in collaboration with testing, development, and site engineering teams
- Support testing of customer specific and COTS/generic builds of products
- Support updates/reviews of the Functional Specifications Documentation
Develop, implement, execute and maintain the Sponsor’s antivirus system. AV Analyst coordinates with the Sponsor to determine configurations needed for test setup, test execution and alert analysis. The AV Analyst deploys and tests against Windows, Linux and MAC based systems.
Job duties include the following:
- Develop, implement, execute, and/or maintains an Independent Validation and Verification (IV&V) program to test, inspect and analyze tools
- Conduct technical assessments of implementation requirements, including identifying specific features and functionalities resulted from alerts
- Perform nightly automated security product testing, ad hoc manual testing, configure test environment, and alert analysis to determine root cause to include alert & system impact
- Identify and communicate errors and/or failures found with the security product
- Coordinate with the Sponsor to document and deliver AV testing reports in approved formats
Desired Qualifications
- Demonstrated experience writing and implementing the DART scripting framework
- Demonstrated experience conducting tests on virtual and bare metal platforms
- Demonstrated experience working with/in the Intelligence Community
Develop, implement, execute and maintain the Sponsor’s antivirus system. Coordinate with the Sponsor to determine configurations needed for test setup, test execution and alert analysis. The AV Analyst deploys and tests against Windows, Linux and MAC based systems.
Job duties include the following:
- Develop, implement, execute, and/or maintains an Independent Validation and Verification (IV&V) program to test, inspect and analyze tools
- Conduct technical assessments of implementation requirements, including identifying specific features and functionalities resulted from alerts
- Perform nightly automated security product testing, ad hoc manual testing, configure test environment, and alert analysis to determine root cause to include alert & system impact
- Identify and communicate errors and/or failures found with the security product
- Coordinate with the Sponsor to document and deliver AV testing reports in approved formats
Desired Qualifications
- Demonstrated experience writing and implementing the DART scripting framework
- Demonstrated experience conducting tests on virtual and bare metal platforms
- Demonstrated experience working with/in the Intelligence Community
Peraton’s has an opportunity for an experienced Software Developer Senior
The position is a remote opportunity. Must be U.S. Citizen and requires an active/current fully adjudicated DoD Secret clearance
- Develop technical solutions to complex problems.
- Support the development and/or sustainment of a software development environment that covers the entire Software Development Lifecycle using current methodologies to include Continuous Deployment, Agile, and Development Operations (DevOps).
- Designs, develops, documents, tests and debugs applications software.
- Conducts multidisciplinary research and collaborates with cross-functional engineering and development teams in the planning, design, development, and utilization of Cloud-based capabilities for the development, modification, and deployment of commercial-of-the-shelf (COTS) software.
- Analyzes user needs and software requirements to determine feasibility of design within time and cost constraints.
- Confers with systems analysts, engineers, and cross-functional teams to design software and to obtain information on project limitations and capabilities, performance requirements and interfaces.
- Designs, develops and modifies software systems, using scientific analysis and mathematical models to predict and measure outcomes and consequences of design.
- Coordinates software testing and deployment to ensure specifications are met.
- Assist the Scrum Master and Scrum Team in providing technical expertise in executing contract deliverables.
- Provide support to the Chief Enterprise Architect, Release Train Engineer, Senior Leadership and the client with regards to software development best practices.
- Support Quality Assurance and Quality Control verification within all applicable phases of software development to assure all actions are completed in accordance with appropriate policy, standards and procedures.
- Collaborate with government Product Owners, cross-functional teams, and client vendors to support rapid integration and interoperability of software.
- Ensure the quality of all services and deliverables across the contract.
- Ensure high customer satisfaction and compliance with all government and corporate policies.
Perform advanced static and dynamic memory and on-disk forensic analysis of Windows, LINUX, and mobile operating systems, utilizing a host of commercial and internally developed forensic solutions. Forensic investigations include hard drive, memory, solid state storage and network traffic platforms. Forensic analysis focuses on scientifically collecting, processing, preserving, analyzing, and presenting digital artifacts in support of network vulnerability mitigation and data recovery. The forensic analyst will identify digital data for examination and analysis in manner that maintains the integrity and objectivity of the forensic process. Digital Forensic Analysis consists of four focus areas: software reverse engineering, network forensics, file system and operating system forensics, and hardware forensics.
The Analyst job duties will consist of the following:
- Develop, implement, execute, and/or maintain an Independent Validation & Verification (IV&V) program to independently test, inspect and analyze performance of tools, and applications relative to user and system requirements.
- Identify, collect and analyze artifacts
- Provide insight and evaluation of binaries and behaviors to support tool analysis and conduct analysis to determine functionality of tools
- Apply digital forensic techniques and data recovery best practices and industry standards (such as or similar to SANS DFIR)
- Perform digital forensic analysis on user platforms and devices such as Windows, Linux, and MAC using commercial products such as EnCase, SIFT, X-Ways, Wireshark and Forensic ToolKit
- Perform forensic analysis including disk image analysis, memory analysis and static and dynamic malware analysis
- Complete incident response evaluation/analysis and recommend mitigation approach based on observations
- Reverse engineer software and tools, and write and deploy code in Sponsor directed format such as Bash, Powershell, and Python to create custom analysis capabilities.
- Build and troubleshoot test environments from user requirement documents
- Coordinate with the Sponsor to document and deliver Forensic testing reports in approved formats
Desired Qualifications:
- Experience in one or more of the requirements specified below:
- Demonstrated experience building custom analysis tools and scripts to enhance analysis techniques
- Demonstrated understanding of the MITRE ATT&CK framework
- Demonstrated experience working with/in the Intelligence Community
- One or more of the following professional certifications, or other relevant certification:
- Certified Ethical Hacker (CEH)
- Global Information Assurance Certification (GIAC) Certified Forensic Analyst (GFCA)
- GIAC Reverse Engineering Malware (GREM)
Perform advanced static and dynamic memory and on-disk forensic analysis of Windows, LINUX, and mobile operating systems, utilizing a host of commercial and internally developed forensic solutions. Forensic investigations include hard drive, memory, solid state storage and network traffic platforms. Forensic analysis focuses on scientifically collecting, processing, preserving, analyzing, and presenting digital artifacts in support of network vulnerability mitigation and data recovery. The forensic analyst will identify digital data for examination and analysis in manner that maintains the integrity and objectivity of the forensic process. Digital Forensic Analysis consists of four focus areas: software reverse engineering, network forensics, file system and operating system forensics, and hardware forensics.
The Analyst job duties will consist of the following:
- Develop, implement, execute, and/or maintain an Independent Validation & Verification (IV&V) program to independently test, inspect and analyze performance of tools, and applications relative to user and system requirements.
- Identify, collect and analyze artifacts
- Provide insight and evaluation of binaries and behaviors to support tool analysis and conduct analysis to determine functionality of tools
- Apply digital forensic techniques and data recovery best practices and industry standards (such as or similar to SANS DFIR)
- Perform digital forensic analysis on user platforms and devices such as Windows, Linux, and MAC using commercial products such as EnCase, SIFT, X-Ways, Wireshark and Forensic ToolKit
- Perform forensic analysis including disk image analysis, memory analysis and static and dynamic malware analysis
- Complete incident response evaluation/analysis and recommend mitigation approach based on observations
- Reverse engineer software and tools, and write and deploy code in Sponsor directed format such as Bash, Powershell, and Python to create custom analysis capabilities.
- Build and troubleshoot test environments from user requirement documents
- Coordinate with the Sponsor to document and deliver Forensic testing reports in approved formats
Desired Qualifications:
- Experience in one or more of the requirements specified below:
- Demonstrated experience building custom analysis tools and scripts to enhance analysis techniques
- Demonstrated understanding of the MITRE ATT&CK framework
- Demonstrated experience working with/in the Intelligence Community
- One or more of the following professional certifications, or other relevant certification:
- Certified Ethical Hacker (CEH)
- Global Information Assurance Certification (GIAC) Certified Forensic Analyst (GFCA)
- GIAC Reverse Engineering Malware (GREM)
Perform advanced static and dynamic memory and on-disk forensic analysis of Windows, LINUX, and mobile operating systems, utilizing a host of commercial and internally developed forensic solutions. Forensic investigations include hard drive, memory, solid state storage and network traffic platforms. Forensic analysis focuses on scientifically collecting, processing, preserving, analyzing, and presenting digital artifacts in support of network vulnerability mitigation and data recovery. The forensic analyst will identify digital data for examination and analysis in manner that maintains the integrity and objectivity of the forensic process. Digital Forensic Analysis consists of four focus areas: software reverse engineering, network forensics, file system and operating system forensics, and hardware forensics.
The Analyst job duties will consist of the following:
- Develop, implement, execute, and/or maintain an Independent Validation & Verification (IV&V) program to independently test, inspect and analyze performance of tools, and applications relative to user and system requirements.
- Identify, collect and analyze artifacts
- Provide insight and evaluation of binaries and behaviors to support tool analysis and conduct analysis to determine functionality of tools
- Apply digital forensic techniques and data recovery best practices and industry standards (such as or similar to SANS DFIR)
- Perform digital forensic analysis on user platforms and devices such as Windows, Linux, and MAC using commercial products such as EnCase, SIFT, X-Ways, Wireshark and Forensic ToolKit
- Perform forensic analysis including disk image analysis, memory analysis and static and dynamic malware analysis
- Complete incident response evaluation/analysis and recommend mitigation approach based on observations
- Reverse engineer software and tools, and write and deploy code in Sponsor directed format such as Bash, Powershell, and Python to create custom analysis capabilities.
- Build and troubleshoot test environments from user requirement documents
- Coordinate with the Sponsor to document and deliver Forensic testing reports in approved formats
Desired Qualifications:
- Experience in one or more of the requirements specified below:
- Demonstrated experience building custom analysis tools and scripts to enhance analysis techniques
- Demonstrated understanding of the MITRE ATT&CK framework
- Demonstrated experience working with/in the Intelligence Community
- One or more of the following professional certifications, or other relevant certification:
- Certified Ethical Hacker (CEH)
- Global Information Assurance Certification (GIAC) Certified Forensic Analyst (GFCA)
- GIAC Reverse Engineering Malware (GREM)
Seeking a motivated IMAGE SCIENTIST to support product evaluations, algorithm quality studies, new product initializations, or develop image quality equations to quantify the expected quality of an imaging system.
Candidate should have a working understanding and practical application of modeling components of the image path to include sensor, detector, atmospheric, and material properties. Imaging systems could include panchromatic (pan), RADAR, LIDAR, OPIR, hyperspectral (HSI) and/or multispectral (MSI) on board space or airborne platforms. Familiarity with current GEOINT systems, products and development, as well as the exploitation software packages will be necessary to develop test and verification methodologies. The candidate will work within an existing team to complete tasks as prioritized by government customers. Good communication and team work is necessary. A history of delivering results is critical to success.
Perform advanced static and dynamic memory and on-disk forensic analysis of Windows, LINUX, and mobile operating systems, utilizing a host of commercial and internally developed forensic solutions. Forensic investigations include hard drive, memory, solid state storage and network traffic platforms. Forensic analysis focuses on scientifically collecting, processing, preserving, analyzing, and presenting digital artifacts in support of network vulnerability mitigation and data recovery. The forensic analyst will identify digital data for examination and analysis in manner that maintains the integrity and objectivity of the forensic process. Digital Forensic Analysis consists of four focus areas: software reverse engineering, network forensics, file system and operating system forensics, and hardware forensics.
The Analyst job duties will consist of the following:
- Develop, implement, execute, and/or maintain an Independent Validation & Verification (IV&V) program to independently test, inspect and analyze performance of tools, and applications relative to user and system requirements.
- Identify, collect and analyze artifacts
- Provide insight and evaluation of binaries and behaviors to support tool analysis and conduct analysis to determine functionality of tools
- Apply digital forensic techniques and data recovery best practices and industry standards (such as or similar to SANS DFIR)
- Perform digital forensic analysis on user platforms and devices such as Windows, Linux, and MAC using commercial products such as EnCase, SIFT, X-Ways, Wireshark and Forensic ToolKit
- Perform forensic analysis including disk image analysis, memory analysis and static and dynamic malware analysis
- Complete incident response evaluation/analysis and recommend mitigation approach based on observations
- Reverse engineer software and tools, and write and deploy code in Sponsor directed format such as Bash, Powershell, and Python to create custom analysis capabilities.
- Build and troubleshoot test environments from user requirement documents
- Coordinate with the Sponsor to document and deliver Forensic testing reports in approved formats
Desired Qualifications:
- Experience in one or more of the requirements specified below:
- Demonstrated experience building custom analysis tools and scripts to enhance analysis techniques
- Demonstrated understanding of the MITRE ATT&CK framework
- Demonstrated experience working with/in the Intelligence Community
- One or more of the following professional certifications, or other relevant certification:
- Certified Ethical Hacker (CEH)
- Global Information Assurance Certification (GIAC) Certified Forensic Analyst (GFCA)
- GIAC Reverse Engineering Malware (GREM)
We are seeking a motivated product quality SYSTEM ENGINEER to lead the planning, test development, data definition, and task execution for new and existing products within the National System for Geospatial-Intelligence (NSG). The candidate will need to write clear test plans to satisfy the test objective. They will lead a team of image scientists, image analysts, photogrammetrists, and statisticians to perform specific tasks, track issues, and clearly communicate status and results to multiple stakeholders.
The mission spans many data providers and sensor phenomenologies including electrical-optical, RADAR, LIDAR, OPIR, motion, multi- and hyper-spectral. We work to verify and validate product visual quality, as well as the accuracy of the support data. The qualified candidate should have experience with test design to verify and validate products against requirements to meet planned concept of operations. The ideal candidate will have image science or imagery analysis experience or knowledge ready to apply to the challenges of the group. Good written and verbal communication and team work is critical.
Peraton is seeking a Project Portfolio Manager to join our team of qualified and diverse individuals. The qualified applicant will become part of the DHS DCCO team. The ideal candidate will be develop and implement enterprise project management standards for a data center management and cloud services contract, and implement improvements based on process measurement data.
Day to Day Work Responsibilities:
- Staff and manage a team of project managers and scrum masters matrixed out to data center solution delivery teams. Management activities include assignment of project work, implementation of training plans, mentoring and oversight to ensure standards are followed.
- Responsible for enterprise performance reporting for both internal and customer consumption and facilitating communications during review events.
- Standards will be grounded in PMBOK, Agile and ITIL, and span all phases of project work.
Performs pre-delivery assessments, acceptance test evaluations and post-delivery characterizations on Sponsor developed tools. Pre-delivery assessments include high level reviews of tool quality and readiness for delivery to the Sponsor from tool developers, as well as providing feedback on areas of improvement.
Acceptance test evaluations and post-delivery tool characterizations include:
- Reviewing, analyzing, and providing feedback on tool developer-provided test plans, procedures, reports, user manuals, and other artifacts.
- Witnessing tool developer test events
- Conduct independent formal test events separate from the tool developer, to include building diverse test harnesses that can include mixed virtual machine (VMWare and ESXi) and bare metal for Windows, MAC and Linux variants , and embedded hardware platforms using scripting languages.
- Executing ad-hoc or informal test exercises on the tool under review by using the tool in ways representative of operational use that may not be delineated in formal test documentation
- Provide recommendations to the Sponsor GTM on the tool capabilities relative to user and system requirements
- Design, develop, update, and execute clear and comprehensive test plans, test objectives and test cases, and perform network traffic analysis
- Conduct bare metal testing on a variety of hardware platforms
- Document any and all test results in a clear, concise, and comprehensive way
Desired Quals:
- Demonstrated experience with cyber operations tactics, techniques, and procedures
- Demonstrated proficiency writing scripts in Python
Peraton is hiring a Database/Software Engineer to join our Cyber Mission business unit in Jessup, MD. As a software engineer on our team, you will support one of the largest enterprise-wide Engineering contracts within the Intelligence Community. This is a full-time position requiring 1880 hours of support per year; and work is performed at the customer site. As a Database/Software Engineer on our team you will support a tool maintenance and tool modification task that relies on database and system requirements analysis. Current and continuing Security+ certification will be a requirement for these duties. You will be responsible for working with government technical leads in the Proposal Evaluation Tool support and advancement. SSP compliance for the system and database updates will be part of the maintenance duties associated with this position.
· Understanding of programming and data engineering concepts and best practice.
· Experience with Python, SQL, and/or Spark.
· Experience working with both structured, semi-structured, and unstructured data to include data parsing, transformation, schema definition, and query/analysis.
· Ability to manage and organize data while identifying trends and inconsistencies that will impact downstream analytics
· Ability to work both independently and collaboratively.
· High levels of curiosity, creativity, and problem-solving capabilities.
· Strong written and verbal communication skills.
· Experience with data pipelines or be willing to learn a pipeline from bottom to top
· Be able to trouble shoot files against an architecture to see where the upload process is failing.
· Be able to understand unit tests and add to them to increase stability to the entire pipeline.
· Be prepared to use, GIT, JIRA, Confluence, Anaconda, Spyder, and Microsoft tools.
· Be prepared to express ideas and solutions and walk together with teammates through coding challenges
Role and responsibility for this position:
The network security research scientist will develop innovative solutions to solve hard, real-world networking problems. You’ll take responsibility to accomplish specific deliverables within a small team setting of fellow engineers. You’ll communicate and collaborate with fellow team members and help guide junior staff.
Peraton Labs generates transformative applied research to fuel solutions for our customers unique challenges. We are a self-sustaining research center within Peraton that provides applied research and engineering to enable government agencies, utilities and commercial enterprises to fully exploit the future of communications, analytics and cyber security.
Who we’re looking for:
- Cyber: We are looking for staff with a strong interest (and ideally a track record) in cyber security research and development.
- Generalists: You should have a breadth of knowledge across multiple domains. You’ll typically focus your work on the domain(s) of your specialty or preference, but a strong multi-domain awareness and ability is required. You should have a curiousity to learn new technology.
- Tangible: You’ll work on applied research program to conceive and develop prototypes to solve cutting-edge, complex problems.
Peraton seeks a Senior Data Engineer to support the ARCYBER G36 Cyber Defense Operations Center (CDOC). Location: Fort Gordon, GA.
The ARCYBER CDOC conducts cyberspace operations to protect Army cyberspace capabilities. In this SME role, you will be responsible for the collection, management, and conversion of raw data into information that can be interpreted by data scientists and data analysts. Data accessibility is the ultimate goal, which is to enable Army organization to utilize data for performance evaluation and optimization.
Tasks include:
• Assist in the development and implementation of a database and its architecture.
• Assess requirements and apply relevant database techniques to create a robust architecture.
• Conduct periodic testing to identify any bugs or performance issues.
• Report and facilitate the correction of issues with the correlation tools and data feeds
• Assist in the maintenance of the data platform and ensure it works smoothly without causing any disruption.
• Manage large-scale processing systems where performance and scalability issues need continuous maintenance.
• Support client by constructing dataset procedures that can help with data mining, modeling, and production.
Are you looking for an opportunity to make a difference in the government space? This is an opportunity to build your experience with using the latest tools, trends, and techniques on collection operations issues supporting the mission of our Intelligence Community Customer. Let us help you in building your career while you provide mission critical support to the warfighter.
Collection analysts focus on how intelligence is collected and refine requirements to ensure mission impact. Document the government's or military's intelligence information needs, identify gaps, evaluate reporting, and communicate and collaborate each with internal and external organizations. Advises senior decision makers on the application of assets, technical solutions, formulation of intelligence policy, and allocation of resources to effect the collection against the nation's intelligence requirements. Drafts and delivers reports and briefings, works with sophisticated databases and computer systems, and participates in diverse committees and working groups.
Collection Manager – HUMINT
- Provide operational support to and serve as the conduit to Officers and Consumers supporting Department of Defense (DoD) HUMINT Operations.
- Format, review, quality control, and release Information Intelligence Reports (IIR), according to policies and guidance outlined to meet reporting thresholds.
- Coordinate collection issues, priorities, requirements, topics, and concerns to mitigate and maximize mission impact.
- Provide detailed input to appropriate boards and panels. And, represent defense HUMINT in agency, defense, and national forums.
- Conduct post-IIR publication review and annual IIR reconciliation; Maintain IIR reporting metrics to assist in the collection management mission.
- Utilize available intelligence tools to assist in a qualitative and quantitative reviews of platform/collector performance.
- May be asked to task Intelligence Community Requirements (ICRs) and track Notices of Intelligence Potential (NIP) produced by DO Officers to distribute to IIC analysts.
- Provide input to the integrated collection or operations strategy documents.
- Focus on efforts outlined in the Strategic Intelligence Plan, National Intelligence Priority Framework, or National Collection HUMINT Directives according to platform Placement and Access.
- Focus IIC Lines of Effort; align Program of Analysis Key Intelligence Questions to the LOEs to ultimately align the appropriate HUMINT collection requirements suitable for mission success.
- Draft, edit, and provide input to Operation Directives or HUMINT Collection Requirements supporting all DO locations.
We look forward to you bringing your talent to add to our team supporting a robust, world-wide national intelligence program providing mission application design, development, engineering and integration services in support of the U.S. Intelligence Community. Peraton, a recognized leader in Cyber, Digital Transformation, Cloud, Operations and Engineering, is seeking a skilled Systems Administrator to join our team of professionals delivering technology services and capabilities in defense of the nation. You would be joining a team of professionals with over 10 years of outstanding support developing and sustaining mission critical and mission essential applications to prevent strategic surprise and deliver a decision advantage to warfighters, defense planners, and policy makers. We take pride that our users include warfighters and interagency partners that defend America’s national security interests. We are committed to investing in you and your family through paid benefits, competitive total compensation, challenging opportunities and career growth opportunities. If you are ready to be challenged, advance your career, passionate about making a difference, and are excited to support our country’s defense and intelligence missions, we are ready to talk to you!
Position Description:
- Maintains smooth operation of multi-user computer systems, including coordination with network engineers.
- Monitors and manages system resources, including CPU usage, disk usage, and response times to maintain operating efficiency.
- Performs systems security administration functions, including creating user profiles and accounts.
- Provides Tier 3 problem identification, diagnosis and resolution of problems.
- Configure operating systems.
Other duties may include:
- Setting up administrator accounts
- Maintaining system documentation
- Tuning system performance
- Installing system wide software, applications/operating systems hardening, and allocating mass storage space.
- Interact with users and evaluates vendor products.
- Makes recommendations to purchase hardware and software, coordinates installation and provides backup recovery.
- Develops and monitors policies and standards for allocation related to the use of computing resources.
We look forward to you bringing your talent to add to our team supporting a robust, world-wide national intelligence program providing mission application design, development, engineering and integration services in support of the U.S. Intelligence Community. Peraton, a recognized leader in Cyber, Digital Transformation, Cloud, Operations and Engineering, is seeking a skilled Systems Administrator to join our team of professionals delivering technology services and capabilities in defense of the nation. You would be joining a team of professionals with over 10 years of outstanding support developing and sustaining mission critical and mission essential applications to prevent strategic surprise and deliver a decision advantage to warfighters, defense planners, and policy makers. We take pride that our users include warfighters and interagency partners that defend America’s national security interests. We are committed to investing in you and your family through paid benefits, competitive total compensation, challenging opportunities and career growth opportunities. If you are ready to be challenged, advance your career, passionate about making a difference, and are excited to support our country’s defense and intelligence missions, we are ready to talk to you!
Position Description: Maintains smooth operation of multi-user computer systems, including coordination with network engineers. Monitors and manages system resources, including CPU usage, disk usage, and response times to maintain operating efficiency. Performs systems security administration functions, including creating user profiles and accounts. Provides Tier 3 problem identification, diagnosis and resolution of problems. Configure operating systems. Other duties may include setting up administrator accounts, maintaining system documentation, tuning system performance, installing system wide software, applications/operating systems hardening, and allocating mass storage space. Interacts with users and evaluates vendor products. Makes recommendations to purchase hardware and software, coordinates installation and provides backup recovery. Develops and monitors policies and standards for allocation related to the use of computing resources.