Senior ICS Threat Analyst
This role is located in Arlington, VA. (Hybrid: Remote - 50% / On-site - 50%)
In this role, you will:
Peraton is currently hiring Industrial Control System Cyber Threat Intelligence Analysts for its Federal Strategic Cyber programs.
Location: Arlington, VA. (Hybrid: Remote - 50% / On-site - 50%)
Peraton is seeking a full-time Malware Analyst to join our USCYBERCOM team located in Fort Meade, MD.
Location: On-site at Fort Meade, MD.
In this role you will:
-
Peraton is seeking Junior Software Engineer to support an Intel Community (IC) mission in the Ft. Meade/Annapolis Junction, MD area. The Cyber Software Engineer will develop, maintain, and enhance complex and diverse software systems (e.g., processing-intensive analytics, novel algorithm development, manipulation of extremely large data sets, real-time systems, and business management information systems) based upon documented requirements.
Responsibilities may include:
- Review and test software components for adherence to the design requirements and documents test results.
- Resolve software problem...
Peraton is seeking a Senior Systems Administration (SA) to support an Intel Community (IC) mission in the Annapolis Junction area. The Senior SA will provide support for implementation, troubleshooting and maintenance of Information Technology (IT) systems.
Responsibilities may include:
- Manage IT system infrastructure and any processes related to these systems.
- Provide support to IT systems including day-to-day operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices, etc.
- Provide Tier 1 (Help Desk) and Tier 2 (Escalation) problem identification, diagnosis and resolution of problems.
- Provide support for the...
This Senior Software Engineer position supports the Department of Defense Cyber Crime Center (DC3), a leading organization in the field of cybersecurity. This position serves as a functional member of a team consisting of a Program Manager and several other matrixed support staff that conduct software development, software engineering, cloud computing, and IT portfolio management. In this role, the selected candidate will be embedded at a customer site, responsible for implementing, testing, and operating advanced software security techniques in compliance with technical reference architecture; performing ongoing security testing and code review to improve software security; troubleshooting and debugging issues that arise; provide...
This Senior Network Engineer position supports the Department of Defense Cyber Crime Center (DC3), a leading organization in the field of cybersecurity. This position serves as a functional member of a team consisting of a Program Manager and several other matrixed support staff that conduct software development, software engineering, cloud computing, and IT portfolio management. In this role, the selected candidate will be embedded at a customer site, working closely with our client to design and plan network communications systems. The candidate will provide specifications and detailed schematics for network architectures, conduct cost/benefit analysis, and provide specific detailed information for hardware and software...
Peraton is currently looking for Malware Reverse Engineer to support one of our longstanding customers. The primary responsibility will focus on isolating, reviewing, analyzing, and reverse-engineering malicious binaries to determine functionality and capability. The Malware Reverse Engineer will analyze samples and provide a written technical report related to the scope, nature, and characteristics of the malicious code.
Uses expertise in malware reverse engineering and analysis to evaluate and analyze complex malicious code using tools,...
- Evaluate, prioritize, and manage risk within assigned portfolio.
- Analyze intelligence gathered from a variety of outlets to detect and counter potential threats to national security; coordinate with foreign partners to identify patterns, vulnerabilities, and emerging threats.
- Collaborate with intelligence agencies and law enforcement to assess and analyze potential threats including espionage and sabotage.
- Recommend comprehensive CI awareness and vulnerabilities...
- Identify the people, relationships, and organizations having access to the information needed to the address critical US foreign intelligence requirements and find opportunities to disrupt various counterintelligence threats.
- Planning and implementation of foreign intelligence collection, counterintelligence, and other operations.
- Utilize advanced analytic skills and tools, and in-depth knowledge of operation tradecraft to identify opportunities and enhance ongoing operations.
- Liaise and collaborate with users and partner organizations regarding vital intelligence data.
- Monitor CI collection and analysis.
- Responsible for supporting operational elements using specialized applications and tools to enable mission objectives.
- Conduct research related to assigned programs/projects.
- Prepare and present...
The Cybersecurity Analyst focuses on advanced cybersecurity analysis relating to the client’s enterprise networks and systems infrastructure. Core responsibilities include:
- Provides cybersecurity analysis related to the detection of malicious activity on the client’s networks and systems; this support includes analysis of security architectures and controls, operations, and associated long term trend analysis to understand threats/compromises to the client enterprise infrastructure
-
We are looking for new team members who want to take the next step in their career by upgrading their clearance to TS/SCI. Apply now!
To achieve the future mission needs of our customers, Peraton is seeking talented individuals in the Northern Virginia Area to enable enterprise transformation. We examine the art of the possible via in-depth enterprise engineering analysis, baseline definition and control to defend the agency’s investment towards mission modernization. In order to realize Agency strategic...
Peraton seeks a Red Team Cybersecurity Reviewer to provide information assurance expertise in the conduct of DODIN cybersecurity reviews on site at CONUS, OCONUS, and DOD mission partner locations.
Location: Fort Meade, MD and/or Chamberburg, PA.
Tasks include:
-
Be part of our exciting team supporting a robust, world-wide communications network, providing office automation packages; document and information management tools; and collaboration, voice, and video tools in a secure, flexible, distributed architecture supporting a classified DoD IT system deployed worldwide. Peraton is seeking a Senior Oracle Database Administrator to lead and guide all design and upgrade efforts encompassing the Oracle Database environments across a large-scale enterprise Information Technology (IT) program. Responsibilities include:
- Ensure Databases are operating efficiently and effectively.
- Support database...
Peraton is looking for a Senior Software Engineer in Herndon, VA or Aurora, CO to support Intelligence Community and DoD customers as part of a talented,high-performing team. As part of this teamyou will work with emerging service and distributed computing technologies for satellite situational awareness (SSA) data processing and distribution.
The Senior Cloud Architect position, a crucial role in supporting the Department of Defense Cyber Crime Center (DC3), is a hands-on cloud engineering position that primarily focuses on migrating workloads to the cloud. The role is pivotal in delivering infrastructure migrations to the cloud for highly sensitive information and maintaining ownership of technical and service elements related to cloud migration projects. The Senior Cloud Architect contributes to all levels of the architecture and maintains technical documentation while consulting team members on secure coding practices and developing a familiarity with new tools and best practices. Drives the roll-out of cloud management platforms, evaluates their...
Peraton is looking for a Software Developer in Herndon, VA or Aurora, CO to support Intelligence Community and DoD customers as part of a talented, high-performing team. As part of this team you will work with emerging service and distributed computing technologies for satellite situational awareness (SSA) data processing and distribution.
The EMMETT program, a next gen Space Domain Awareness (SDA) Indications and Warning (I&W) system, establishes...
- Evaluate, prioritize, and manage risk within assigned portfolio.
- Analyze intelligence gathered from a variety of outlets to detect and counter potential threats to national security; coordinate with foreign partners to identify patterns, vulnerabilities, and emerging threats.
- Collaborate with intelligence agencies and law enforcement to assess and analyze potential threats including espionage and sabotage.
- Recommend comprehensive CI awareness and vulnerabilities...
- Identify the people, relationships, and organizations having access to the information needed to address critical US foreign intelligence requirements and find opportunities to disrupt various counterintelligence threats.
- Plan and implement foreign intelligence collection, counterintelligence, and other operations.
- Utilize advanced analytic skills and tools, and in-depth knowledge of operation tradecraft to identify opportunities and enhance ongoing operations.
Peraton is currently seeking a Contracts Administration Manager. This position will require an experienced contracts management professional with responsibility for the following:
-
Peraton is seeking an AN/ AQS-24 USV Side Scan Sonar Technician to support our US Navy Customer in Manama, Bahrain. Position will require training in Panama City for 2 to 3 months and will then require a one-year minimum deployment to Bahrain.
As a Side Scan Sonar Technician, you will integrate into a small team charged with operations and maintenance of deployed systems in support of US Navy mine countermeasures (MCM) missions in the U.S. Fifth Fleet Area of Responsibility. The small craft employed (11-meter RHIB) is equipped...
Responsibilities include, but are not limited to:
• Provides leadership and management to the execution, definition, and strategy of enterprise applications technology projects
• Responsible for the end-to-end management of one or more medium to large sized, moderately to highly complex software development projects within the IT and operating departments
• Responsible for scoping, planning, executing, and monitoring the projects to keep projects on schedule, on budget, and following appropriate protocols with Technical Operations, Application Development and Business Intelligence teams
• Performs strategic planning, coordination of a roadmap, development, construction, and...
Responsibilities include, but are not limited to:
• Utilize off ensive toolsets such as Metaspolit and Kali Linux to safely analyze and penetration test production networks and systems, documenting steps and procedures to produce usable vulnerability assessments for the customer
• Identify and investigate vulnerabilities, asses exploit potential, and document findings and remedies for presentation to facilitate mitigations on customer systems
• Perform planning, execution, and documentation of penetration testing missions in accordance with Red Team methodologies
• Perform web application testing using tools such as Burp Suite, Zap Proxy, Skipfish and Nikto, and open source...
Responsibilities include, but are not limited to:
• Identify and investigate vulnerabilities, asses exploit potential, and document findings and remedies for presentation to facilitate mitigations oncustomer systems
• Perform daily cyber threat research and present findings to the organization to maintain knowledge of current adversary tactics, techniques andprocedures and how to apply them. Brief staff and leadership on these findings
• Evaluate system security configurations, identify intrusion, identify incident method, and perform root cause analysis on intrusions
• Perform analysis of complex software systems to determine both functionality and intent of software systems
Responsibilities include, but are not limited to:
• Leads and participates in the evaluation and analysis of complex malicious code through the utilization of tools, including dissemblers, debuggers, hex editors, un-packers, virtual machines, and network sniffers
• Responsible for providing findings in a technical report with details of the malware, identification parameters, advanced capabilities, and mitigation strategies
• Conducts research in the area of malicious software, vulnerabilities, and exploitation tactics
• Requires experience with application security, network security, reverse engineering, or malware
• Requires strong knowledge of worms, viruses,...
Responsibilities include, but are not limited to:
• Applies ITIL experience in performance analysis and development of existing processes, procedures and methods to promote effective business and systems operations through standardization, improvement, simplification and discontinuance
• Provides ITIL subject matter expertise to develop, improve, integrate, measure, and report on operational processes throughout network
• Leverages expertise in the identification, development, implementation, and monitoring of Continual Service Improvement (CSI) and Continuous Process Improvement (CPI) opportunities and initiatives
• Performs Root Cause Analysis (RCA) and creates RCA reports to...
Responsibilities include, but are not limited to:
• Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS
• Provide liaison support between the system owner and other IS security personnel
• Ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle
• Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis
• Conduct required IS vulnerability scans according to risk assessment parameters.
• Develop Plan of Action and Milestones (POAMs) in response...
Responsibilities include, but are not limited to:
• Analyzes, maps, protects, or discovers vulnerabilities, intrusions, and threats in various computer network systems
• Conducts computer and/or network security, target development, and understands all aspects of computer/network security to include firewall administration, encryption technologies, and network protocols
• Reports events or incidents that occur to mitigate immediate and potential network and host threats
• Perform Incident Response through analysis of malicious data-sets and publicly known exploits or vulnerabilities for the creation of custom detection and prevention methods. Perform log analysis and event...
Responsibilities include, but are not limited to:
• Designs, develops, and implements cloud-based solutions
• Designs cloud architecture and completes plans and specifications to develop solutions
• Collaborates with product managers and engineers to develop specifications for new cloud-based products/services, applications, and solutions
• Drives the roll-out of cloud management platforms, evaluates its performance and implements enhancements
• Develops and enriches the product portfolio of cloud services and value-added services.
• Creates solution recommendations to include Basis of Estimate for cloud services
• Evaluates the cost/benefit of...
Responsibilities include but are not limited to:
• Principal Active Directory Subject Matter Expert (SME) will support our enterprise Active Directory environment serving critical programs with classified information system capabilities
• Success in this role means you can architect, design, deploy, secure, maintain, and troubleshoot the Active Directory environment across various classified programs
• Analyze current Active Directory environment to identify both technical and operational challenges and develop solutions for improvement
• End to end Installation, configuration, and migration of on-premises Active Directory
• Analysis, design, capacity planning and...
Responsibilities include, but are not limited to:
• The Regional Cyber Center – Conus (RCC-C) program is seeking a Deupty Program Manager to assist on leading the Department of Defense Information Networks (DoDIN) and Defensive Cyber Operations(DCO) teams in Fort Huachuca, Arizona.
• The RCC-C pushes the boundaries of innovation and security, while providing high availability network services for the Army to accomplish its mission in the U.S.
• The Deputy PM assists the PM in providing day-to-day program direction, ensuring quality stanpjtdards, program tracking, and technical and analytic guidance to program team. As principal representative, you will also provide status updates to...
Responsibilities include, but are not limited to:
• The Regional Cyber Center – Conus (RCC-C) program is seeking a Program Manager to lead the Department of Defense Information Networks (DoDIN) and Defensive Cyber Operations(DCO) teams in Fort Huachuca, Arizona.
• The RCC-C pushes the boundaries of innovation and security, while providing high availability network services for the Army to accomplish its mission in the U.S.
• The Program Manager provides day-to-day program direction, ensuring quality standards, program tracking, and technical and analytic guidance to program team. As principal representative, you will also provide status updates to the Government on the program.
• Provide management,...
Peraton is seeking a Software Application Developer to join our team of diverse, qualified individuals. The Software Aplication Developer works at the United States Postal Service (USPS) Central Repair Facility (CRF) in Topeka, KS. The CRF is a depot repair facility for USPS mail processing, delivery, and bulk mail systems repairable parts. Examples: repairing printed circuit boards, electrical, electronic, mechanical and electro-mechanical assemblies to component level. The CRF provides depot level maintenance for essential automation, mechanization, retail and bulk mail processing systems...
- Identify the people, relationships, and organizations having access to the information needed to address critical US foreign intelligence requirements and find opportunities to disrupt various counterintelligence threats.
- Plan and implement foreign intelligence collection, counterintelligence, and other operations.
- Utilize advanced analytic skills and tools, and in-depth knowledge of operation tradecraft to identify opportunities and enhance ongoing operations.
Are you ready to work on a team that supports the development of cutting edge technology? Our program provides IT-based efforts required to support DoD and the IC for technology and concept development. The DoD intelligence mission is to provide accurate, relevant, and timely data and intelligence to tactical, operational, and strategic decision makers across the COCOM, nuclear, conventional, and Special Operations Forces. Decision superiority is the competitive advantage, enabled by an ongoing situational awareness that allows commanders and their forces to make informed decisions and implement them as fast and effectively as the situation warrants. Decision superiority is about improving...
- Perform technical intelligence collection.
- Evaluate technical and scientific data to provide unique insights related to targeting and collection efforts.
- Technical analysis and exploitation of data sets.
- Report findings and aid in guiding intelligence operations.
- Ability to identify and assess vulnerabilities and technical trends that enable new collection...
Peraton is looking for a JAVA Developer (Mid) in Herndon, VA or Aurora, CO to support Intelligence Community and DoD customers as part of a talented, high-performing team. As part of this
Peraton is looking for a Senior JAVA Developer in Herndon, VA or Aurora, CO to support Intelligence Community and DoD...
- Identify the people, relationships, and organizations having access to the information needed to address critical US foreign intelligence requirements and find opportunities to disrupt various counterintelligence threats.
- Plan and implement foreign intelligence collection, counterintelligence, and other operations.
- Utilize advanced analytic skills and tools, and in-depth knowledge of operation tradecraft to identify opportunities and enhance ongoing operations.
With a distinguished heritage tracing back to Bell Labs, Bellcore, and Telcordia, our experts pave the way. Peraton Labs delivers innovative solutions and revolutionary new capabilities to solve the most difficult and complex challenges for government agencies, utilities, and commercial customers. Peraton Lab’s cybersecurity research protects mission-critical systems and national cyber infrastructure through a broad range of initiatives in computer network defense, secure-by-design techniques and cyber operations and experimentation platforms. Your expertise and...
With a distinguished heritage tracing back to Bell Labs, Bellcore, and Telcordia, our experts pave the way. Peraton Labs delivers innovative solutions and revolutionary new capabilities to solve the most difficult and complex challenges for government agencies, utilities, and commercial customers. Peraton Lab’s cybersecurity research protects mission-critical systems and national cyber infrastructure through a broad range of initiatives in computer network defense, secure-by-design techniques and cyber operations and experimentation platforms. Your expertise and areas of interest may be applied on one or more programs, providing you new opportunities to learn and...
Peraton is seeking a Cyber Penetration Tester to become part of Peraton’s Department of State (DoS) Diplomatic Security Cyber Mission (DSCM) program providing leading cyber and technology security experience to enable innovative, effective and secure business processes.
Location: Arlington, VA. This is a hybrid...
Peraton is seeking an experienced Database Administrator to support our National Programs Intelligence Systems & Application Operating Unit. The SITE III ITS Task Order effort is charged with the orchestration, sustainment, and evolution of a portfolio of mission applications and services for the Defense Intelligence Agency (DIA).
The ideal candidate will be responsible for all Operation & Maintenance (O&M)...
Peraton is currently seeking to hire an experienced Senior Public Affairs Specialist for the USCYBERCOM program located at Fort Meade, MD.
- Assist in leading efforts for the planning and implementation of a comprehensive public affairs program for the Cyber National Mission Force, a sub-unified command subordinate to USCYBERCOM.
- Assist in leading coordination efforts to...
Peraton is seeking a senior level System Engineers to support an Intel Community (IC) mission in the Ft Meade/Annapolis Junction locations. Responsibilities may include:
- Applies systems engineering principles throughout the systems life cycle phases: Concept, Development, Production, Utilization, Support, and Retirement.
- Interacts with the Government regarding Systems Engineering technical considerations and for associated problems, issues or conflicts.
- Communicates with other program personnel, government, overseers, and senior executives.
- Responsible for the technical integrity, quality, and completeness of work performed and deliverables associated...
Be part of our exciting team supporting a robust, world-wide communications network, providing office automation packages; document and information management tools; and collaboration, voice, and video tools in a secure, flexible, distributed architecture supporting a classified DoD IT system deployed worldwide. Seeking a Senior Solaris Engineer to lead and guide all design and upgrade efforts encompassing the Solaris server environments across a large-scale enterprise Information Technology (IT) program.
- Using a holistic approach,...
Ready to make an impact? Peraton has exciting opportunities to join a dynamic multi-disciplinary team, supporting mission critical space and intelligence programs, including development, deployment, operations and maintenance of satellite ground terminals and associated systems. Peraton is seeking a self-starting cleared Network Administrator in our Herndon, VA location.
The Network Administrator will be...
Peraton is seeking an experienced Systems Administrator to support our National Programs Intelligence Systems & Application Operating Unit. The SITE III ITS Task Order effort is charged with the orchestration, sustainment, and evolution of a portfolio of mission applications and services for the Defense Intelligence Agency (DIA).
The potential candidate requires previous experience with Linux...
Peraton is seeking Associate Software Engineers to support our Cyber Mission business unit located in Annapolis Junction, MD.
The Software Engineer will become a member of a mature software development effort. The development effort uses Agile methods to assign, track and manage software activities and requirements within the team. This position will allow an early career software developer to develop and broaden their skills in a number of languages.