Peraton is seeking highly qualified candidate to fill our Engineering Lead role on for the upcoming SCITES (USSOUTHCOM CYBER INFORMATION TECHNOLOGY ENTERPRISE SERVICES). Position is located at the SOUTHCOM HQ in Doral, FL, supporting the HQ, TSOC and other locations abroad (GTMO, Honduras, Colombia etc.).
Peraton will deliver a broad spectrum centralized IT infrastructure, services,...
Peraton is seeking highly qualified candidate to fill our Program Manager role on for the upcoming SCITES (USSOUTHCOM CYBER INFORMATION TECHNOLOGY ENTERPRISE SERVICES). Position is located at the SOUTHCOM HQ in Doral, FL, supporting the HQ, TSOC and other locations abroad (GTMO, Honduras, Colombia etc.).
Peraton will deliver a broad spectrum centralized IT infrastructure,...
Do you want to be part of a team that supports USCYBERCOM's Joint Cyber Warfare Architect (JCWA) capabilities and systems? Peraton is looking for someone to act as a technical liaison on behalf of the Program Office and USCYBERCOM Operations Directorate between capability SMEs and capability developers, capability testers, planning teams, operations support staff, and operating units during planning and operations. Someone experienced to participate in requirements working groups as a capability SME for defined cyber capabilities/tools and/or operations.
Responsibilities include, but are not limited to:
- Designs, develops, tests, installs, and maintains C4I O&M systems for USACISA-P; leads a team of network engineers; experience with Cisco Digital Network Architecture (NDA), Cisco Call Manager (CCM), Cisco Unified Communications Manager (CUCM)
- Provides specifications and detailed schematics for network architecture.
- Conducts cost/benefit analysis and provides specific detailed information for hardware and software selection, implementation techniques and tools for the most efficient solution to meet business needs, including present and future capacity requirements.
- Maintains technical expertise in all areas of network and computer hardware and software...
We are looking for new team members who want to take the next step in their career by upgrading their clearance to TS/SCI. Apply now!
To achieve the future mission needs of our customers, Peraton is seeking talented individuals in the Northern Virginia Area to enable enterprise transformation. We examine the art of the possible via in-depth enterprise engineering analysis, baseline definition and control to defend the agency’s...
Peraton is seeking SkillBridge Interns to support our SITEC 3 project at multiple CONUS locations. These opportunities are designed to assist military members transitioning into the civilian workforce. This application is intended to collect required information and assess the eligibility of potential SkillBridge Interns. Please note that no direct hires will be made for these roles through this application process.
The DoD SkillBridge initiative is tailored to furnish active-duty service members with valuable opportunities for civilian job training, the enhancement of employment skills, and practical work experience within the final 180 days and no less than 30 days of...
Peraton is hiring an Active Directory (AD) Engineer, Senior-level (Migration)in technical designs and support of large Enterprise Active Directory environments and the associated Microsoft product line and services supporting our program in Hanscom, MA
What you'll do:
- Work with Migration team leader to complete the Discovery and Implementation phase,...
Join our exceptional team at Peraton and bring your expertise as a SQL Database Engineer to contribute to a prestigious, worldwide national intelligence program. We are at the forefront of mission application design, development, engineering, and integration services for the U.S. Intelligence Community, and we're excited to welcome individuals like you who are ready to make a difference.
At Peraton, we are recognized leaders in Cybersecurity, Digital Transformation, Cloud Solutions, Operations, and Engineering. We are committed to protecting and...
Peraton is seeking highly qualified candidates to fill multiple positions on for the upcoming Regional Cyber Center program. Positions are located in Sierra Vista, AZ (Fort Huachuca).
You willProvide the 2d Regional Cyber Center (Huachuca) with Defensive Cyber Operations/ NetOps O&M services support. Includes support to any hardware, software, application, tool, system, or network used by the...
Peraton has an immediate opportunity for a Senior Software Engineer to join our Cyber Intel team here in the Laurel, MD area!
As a Senior Software Engineer, you are expected to perform requirements analysis, software development, installation, integration, evaluation, enhancement, maintenance, testing, and problem diagnosis/resolution at a high level of proficiency and independence. You are expected to communicate directions and provide guidance to more junior programmer/analysts, as required....
The Senior Installation Technician is responsible for installing equipment, systems, and supervises installation and assembly work done by other technicians.
- Independently maintains equipment, systems, and conducts testing and troubleshooting
- Investigates equipment and system failures, to determine the cause and repair work required
- Is knowledgeable in technical equipment, IT assets and systems within the facilities, and supports the innovation of equipment, systems, and controls in the facility
- Has a thorough understanding of installation SOPs
SCRUM MASTER responsibilities for new or existing system(s) may include:
- Leads the development effort by conveying the vision to an Agile Scrum delivery team, outlining and prioritizing work based on business value.
- Liaises with stakeholders ensuring their interests are included in the release, and the team to ensure the release is developed by the deadline and within budget.
-
Peraton is seeking a Mechanical Technician I to join our team of diverse, qualified individuals. The Mechanical Technician works at the United States Postal Service (USPS) Central Repair Facility (CRF) in Topeka, KS. The CRF is a depot repair facility for USPS mail processing, delivery, and bulk mail systems repairable parts. Examples: repairing printed circuit boards, electrical, electronic, mechanical and electro-mechanical assemblies to component level. The CRF provides depot level maintenance for essential automation, mechanization, retail and bulk mail processing systems used in all mail...
Peraton is seeking an experienced Senior System Administrator to join our team supporting a very unique customer in the Washington, DC area. Our unique program provides information management and information technology (IT) support for critical technical work to operate and maintain the classified networks for executive-level government leaders.
Our program delivers high-profile, technical infrastructure support for our customer and its relative nodes over the world. The team provides Personnel Management, Systems Engineering and administration, Software Engineering (SharePoint Development and Project Management/Systems Integration support), and...
- Evaluate, prioritize, and manage risk within assigned portfolio.
- Analyze intelligence gathered from a variety of outlets to detect and counter potential threats to national security; coordinate with foreign partners to identify patterns, vulnerabilities, and emerging threats.
- Collaborate with intelligence agencies and law enforcement to assess and analyze potential threats including espionage and sabotage.
- Recommend comprehensive CI awareness and vulnerabilities...
Responsibilities include, but are not limited to:
• Demonstrated capability as a Network Operations Manager responsible for the O&M of all CENTRIX-Korea network infrastructure
• Experience managing/maintaining routers, switches, KG175/SG250 cryptographic equipment, experience with C4I networks, including SIPR/NIPR/COLAN/BICES/JWICS. Shall possess a high degree of expertise to include following technologies: routers, network switches, network encryption devices (e.g. KG/SG-250), Ethernet, 802.lX VPNs, GRE tunneling, CSUs/DSUs, TCP/IP UDP, MPLS, 1Pv4, IPv6, PVCs, ACLs MPLS,CWM, DWDM
• The NETOPS Manager shall oversee the internal enterprise services of Network Administration, System Administration, Unified...
One of our contracts located in Huntsville, AL is looking for several Radar Engineers with the following specialized experience:
- RF Aperture: Expertise in dish and phased array antennas (both active and passive) and experience working with RF aperture subsystems to include dish, planar and phased array (passive and active)...
Senior ICS Threat Analyst
This role is located in Arlington, VA. (Hybrid: Remote - 50% / On-site - 50%)
In this role, you will:
Peraton is currently hiring Industrial Control System Cyber Threat Intelligence Analysts for its Federal Strategic Cyber programs.
Location: Arlington, VA. (Hybrid: Remote - 50% / On-site - 50%)
Peraton is seeking a full-time Malware Analyst to join our USCYBERCOM team located in Fort Meade, MD.
Location: On-site at Fort Meade, MD.
In this role you will:
-
Peraton is seeking Junior Software Engineer to support an Intel Community (IC) mission in the Ft. Meade/Annapolis Junction, MD area. The Cyber Software Engineer will develop, maintain, and enhance complex and diverse software systems (e.g., processing-intensive analytics, novel algorithm development, manipulation of extremely large data sets, real-time systems, and business management information systems) based upon documented requirements.
Responsibilities may include:
- Review and test software components for adherence to the design requirements and documents test results.
- Resolve software problem...
Peraton is seeking a Senior Systems Administration (SA) to support an Intel Community (IC) mission in the Annapolis Junction area. The Senior SA will provide support for implementation, troubleshooting and maintenance of Information Technology (IT) systems.
Responsibilities may include:
- Manage IT system infrastructure and any processes related to these systems.
- Provide support to IT systems including day-to-day operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices, etc.
- Provide Tier 1 (Help Desk) and Tier 2 (Escalation) problem identification, diagnosis and resolution of problems.
- Provide support for the...
This Senior Software Engineer position supports the Department of Defense Cyber Crime Center (DC3), a leading organization in the field of cybersecurity. This position serves as a functional member of a team consisting of a Program Manager and several other matrixed support staff that conduct software development, software engineering, cloud computing, and IT portfolio management. In this role, the selected candidate will be embedded at a customer site, responsible for implementing, testing, and operating advanced software security techniques in compliance with technical reference architecture; performing ongoing security testing and code review to improve software security; troubleshooting and debugging issues that arise; provide...
This Senior Network Engineer position supports the Department of Defense Cyber Crime Center (DC3), a leading organization in the field of cybersecurity. This position serves as a functional member of a team consisting of a Program Manager and several other matrixed support staff that conduct software development, software engineering, cloud computing, and IT portfolio management. In this role, the selected candidate will be embedded at a customer site, working closely with our client to design and plan network communications systems. The candidate will provide specifications and detailed schematics for network architectures, conduct cost/benefit analysis, and provide specific detailed information for hardware and software...
Peraton is currently looking for Malware Reverse Engineer to support one of our longstanding customers. The primary responsibility will focus on isolating, reviewing, analyzing, and reverse-engineering malicious binaries to determine functionality and capability. The Malware Reverse Engineer will analyze samples and provide a written technical report related to the scope, nature, and characteristics of the malicious code.
Uses expertise in malware reverse engineering and analysis to evaluate and analyze complex malicious code using tools,...
- Evaluate, prioritize, and manage risk within assigned portfolio.
- Analyze intelligence gathered from a variety of outlets to detect and counter potential threats to national security; coordinate with foreign partners to identify patterns, vulnerabilities, and emerging threats.
- Collaborate with intelligence agencies and law enforcement to assess and analyze potential threats including espionage and sabotage.
- Recommend comprehensive CI awareness and vulnerabilities...
- Identify the people, relationships, and organizations having access to the information needed to the address critical US foreign intelligence requirements and find opportunities to disrupt various counterintelligence threats.
- Planning and implementation of foreign intelligence collection, counterintelligence, and other operations.
- Utilize advanced analytic skills and tools, and in-depth knowledge of operation tradecraft to identify opportunities and enhance ongoing operations.
- Liaise and collaborate with users and partner organizations regarding vital intelligence data.
- Monitor CI collection and analysis.
- Responsible for supporting operational elements using specialized applications and tools to enable mission objectives.
- Conduct research related to assigned programs/projects.
- Prepare and present...
The Cybersecurity Analyst focuses on advanced cybersecurity analysis relating to the client’s enterprise networks and systems infrastructure. Core responsibilities include:
- Provides cybersecurity analysis related to the detection of malicious activity on the client’s networks and systems; this support includes analysis of security architectures and controls, operations, and associated long term trend analysis to understand threats/compromises to the client enterprise infrastructure
-
We are looking for new team members who want to take the next step in their career by upgrading their clearance to TS/SCI. Apply now!
To achieve the future mission needs of our customers, Peraton is seeking talented individuals in the Northern Virginia Area to enable enterprise transformation. We examine the art of the possible via in-depth enterprise engineering analysis, baseline definition and control to defend the agency’s investment towards mission modernization. In order to realize Agency strategic...
Peraton seeks a Red Team Cybersecurity Reviewer to provide information assurance expertise in the conduct of DODIN cybersecurity reviews on site at CONUS, OCONUS, and DOD mission partner locations.
Location: Fort Meade, MD and/or Chamberburg, PA.
Tasks include:
-
Be part of our exciting team supporting a robust, world-wide communications network, providing office automation packages; document and information management tools; and collaboration, voice, and video tools in a secure, flexible, distributed architecture supporting a classified DoD IT system deployed worldwide. Peraton is seeking a Senior Oracle Database Administrator to lead and guide all design and upgrade efforts encompassing the Oracle Database environments across a large-scale enterprise Information Technology (IT) program. Responsibilities include:
- Ensure Databases are operating efficiently and effectively.
- Support database...
The Senior Cloud Architect position, a crucial role in supporting the Department of Defense Cyber Crime Center (DC3), is a hands-on cloud engineering position that primarily focuses on migrating workloads to the cloud. The role is pivotal in delivering infrastructure migrations to the cloud for highly sensitive information and maintaining ownership of technical and service elements related to cloud migration projects. The Senior Cloud Architect contributes to all levels of the architecture and maintains technical documentation while consulting team members on secure coding practices and developing a familiarity with new tools and best practices. Drives the roll-out of cloud management platforms, evaluates their...
- Evaluate, prioritize, and manage risk within assigned portfolio.
- Analyze intelligence gathered from a variety of outlets to detect and counter potential threats to national security; coordinate with foreign partners to identify patterns, vulnerabilities, and emerging threats.
- Collaborate with intelligence agencies and law enforcement to assess and analyze potential threats including espionage and sabotage.
- Recommend comprehensive CI awareness and vulnerabilities...
- Identify the people, relationships, and organizations having access to the information needed to address critical US foreign intelligence requirements and find opportunities to disrupt various counterintelligence threats.
- Plan and implement foreign intelligence collection, counterintelligence, and other operations.
- Utilize advanced analytic skills and tools, and in-depth knowledge of operation tradecraft to identify opportunities and enhance ongoing operations.
Peraton is currently seeking a Contracts Administration Manager. This position will require an experienced contracts management professional with responsibility for the following:
-
Peraton is seeking an AN/ AQS-24 USV Side Scan Sonar Technician to support our US Navy Customer in Manama, Bahrain. Position will require training in Panama City for 2 to 3 months and will then require a one-year minimum deployment to Bahrain.
As a Side Scan Sonar Technician, you will integrate into a small team charged with operations and maintenance of deployed systems in support of US Navy mine countermeasures (MCM) missions in the U.S. Fifth Fleet Area of Responsibility. The small craft employed (11-meter RHIB) is equipped...
Responsibilities include, but are not limited to:
• Provides leadership and management to the execution, definition, and strategy of enterprise applications technology projects
• Responsible for the end-to-end management of one or more medium to large sized, moderately to highly complex software development projects within the IT and operating departments
• Responsible for scoping, planning, executing, and monitoring the projects to keep projects on schedule, on budget, and following appropriate protocols with Technical Operations, Application Development and Business Intelligence teams
• Performs strategic planning, coordination of a roadmap, development, construction, and...
Responsibilities include, but are not limited to:
• Utilize off ensive toolsets such as Metaspolit and Kali Linux to safely analyze and penetration test production networks and systems, documenting steps and procedures to produce usable vulnerability assessments for the customer
• Identify and investigate vulnerabilities, asses exploit potential, and document findings and remedies for presentation to facilitate mitigations on customer systems
• Perform planning, execution, and documentation of penetration testing missions in accordance with Red Team methodologies
• Perform web application testing using tools such as Burp Suite, Zap Proxy, Skipfish and Nikto, and open source...
Responsibilities include, but are not limited to:
• Identify and investigate vulnerabilities, asses exploit potential, and document findings and remedies for presentation to facilitate mitigations oncustomer systems
• Perform daily cyber threat research and present findings to the organization to maintain knowledge of current adversary tactics, techniques andprocedures and how to apply them. Brief staff and leadership on these findings
• Evaluate system security configurations, identify intrusion, identify incident method, and perform root cause analysis on intrusions
• Perform analysis of complex software systems to determine both functionality and intent of software systems
Responsibilities include, but are not limited to:
• Leads and participates in the evaluation and analysis of complex malicious code through the utilization of tools, including dissemblers, debuggers, hex editors, un-packers, virtual machines, and network sniffers
• Responsible for providing findings in a technical report with details of the malware, identification parameters, advanced capabilities, and mitigation strategies
• Conducts research in the area of malicious software, vulnerabilities, and exploitation tactics
• Requires experience with application security, network security, reverse engineering, or malware
• Requires strong knowledge of worms, viruses,...
Responsibilities include, but are not limited to:
• Applies ITIL experience in performance analysis and development of existing processes, procedures and methods to promote effective business and systems operations through standardization, improvement, simplification and discontinuance
• Provides ITIL subject matter expertise to develop, improve, integrate, measure, and report on operational processes throughout network
• Leverages expertise in the identification, development, implementation, and monitoring of Continual Service Improvement (CSI) and Continuous Process Improvement (CPI) opportunities and initiatives
• Performs Root Cause Analysis (RCA) and creates RCA reports to...
Responsibilities include, but are not limited to:
• Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS
• Provide liaison support between the system owner and other IS security personnel
• Ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle
• Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis
• Conduct required IS vulnerability scans according to risk assessment parameters.
• Develop Plan of Action and Milestones (POAMs) in response...
Responsibilities include, but are not limited to:
• Analyzes, maps, protects, or discovers vulnerabilities, intrusions, and threats in various computer network systems
• Conducts computer and/or network security, target development, and understands all aspects of computer/network security to include firewall administration, encryption technologies, and network protocols
• Reports events or incidents that occur to mitigate immediate and potential network and host threats
• Perform Incident Response through analysis of malicious data-sets and publicly known exploits or vulnerabilities for the creation of custom detection and prevention methods. Perform log analysis and event...
Responsibilities include, but are not limited to:
• Designs, develops, and implements cloud-based solutions
• Designs cloud architecture and completes plans and specifications to develop solutions
• Collaborates with product managers and engineers to develop specifications for new cloud-based products/services, applications, and solutions
• Drives the roll-out of cloud management platforms, evaluates its performance and implements enhancements
• Develops and enriches the product portfolio of cloud services and value-added services.
• Creates solution recommendations to include Basis of Estimate for cloud services
• Evaluates the cost/benefit of...
Responsibilities include but are not limited to:
• Principal Active Directory Subject Matter Expert (SME) will support our enterprise Active Directory environment serving critical programs with classified information system capabilities
• Success in this role means you can architect, design, deploy, secure, maintain, and troubleshoot the Active Directory environment across various classified programs
• Analyze current Active Directory environment to identify both technical and operational challenges and develop solutions for improvement
• End to end Installation, configuration, and migration of on-premises Active Directory
• Analysis, design, capacity planning and...
Responsibilities include, but are not limited to:
• The Regional Cyber Center – Conus (RCC-C) program is seeking a Deupty Program Manager to assist on leading the Department of Defense Information Networks (DoDIN) and Defensive Cyber Operations(DCO) teams in Fort Huachuca, Arizona.
• The RCC-C pushes the boundaries of innovation and security, while providing high availability network services for the Army to accomplish its mission in the U.S.
• The Deputy PM assists the PM in providing day-to-day program direction, ensuring quality stanpjtdards, program tracking, and technical and analytic guidance to program team. As principal representative, you will also provide status updates to...
Responsibilities include, but are not limited to:
• The Regional Cyber Center – Conus (RCC-C) program is seeking a Program Manager to lead the Department of Defense Information Networks (DoDIN) and Defensive Cyber Operations(DCO) teams in Fort Huachuca, Arizona.
• The RCC-C pushes the boundaries of innovation and security, while providing high availability network services for the Army to accomplish its mission in the U.S.
• The Program Manager provides day-to-day program direction, ensuring quality standards, program tracking, and technical and analytic guidance to program team. As principal representative, you will also provide status updates to the Government on the program.
• Provide management,...
Peraton is seeking a Software Application Developer to join our team of diverse, qualified individuals. The Software Aplication Developer works at the United States Postal Service (USPS) Central Repair Facility (CRF) in Topeka, KS. The CRF is a depot repair facility for USPS mail processing, delivery, and bulk mail systems repairable parts. Examples: repairing printed circuit boards, electrical, electronic, mechanical and electro-mechanical assemblies to component level. The CRF provides depot level maintenance for essential automation, mechanization, retail and bulk mail processing systems...
- Identify the people, relationships, and organizations having access to the information needed to address critical US foreign intelligence requirements and find opportunities to disrupt various counterintelligence threats.
- Plan and implement foreign intelligence collection, counterintelligence, and other operations.
- Utilize advanced analytic skills and tools, and in-depth knowledge of operation tradecraft to identify opportunities and enhance ongoing operations.