The Cyber Security Engineer monitors, analyzes, and detects cyber events and incidents within information systems and networks under general supervision. The successful candidate will analyze technical and non-technical data and metadata to determine normal patterns of events, proactively identify abnormalities, and determine root-cause of abnormalities. All team members are expected to positively support a blended environment through excellent verbal and written communications skills.
#SpaceIntel
We are seeking a highly skilled and experienced Lead LAN/WAN Engineer to join our dynamic team. In this leadership role, you will provide expert-level guidance and technical direction for local- and wide-area networking solutions. You will serve as a trusted advisor to both internal teams and customers, leveraging deep knowledge of networking technologies and management tools. The ideal candidate will have significant hands-on experience with Cisco, Juniper, F5, Aruba, and other related network components, along with a solid understanding of advanced routing protocols and network architectures.
Key Responsibilities:
- Leadership...
Peraton is hiring a Cross Access Geolocation Systems Engineer to join our Cyber Mission business unit in Jessup, MD. As a systems engineer on our team, you will support one of the largest enterprise-wide Engineering contracts within the Intelligence Community. This is a full-time position requiring 1880 hours of support per year; and work is performed at the customer site. As a Cross Access Geolocation Systems Engineer on our team you will provide integration support (requirements, specification through development) of cooperative geolocation systems. You will also represent the customer’s organization at technical exchanges and will support the development of collaborative, cross...
Peraton is hiring a Senior Sensor Operations Process Engineer to join our Cyber Mission business unit in Jessup, MD. As a Process Engineer on our team, you will support one of the largest enterprise-wide engineering contracts within the Intelligence Community. This is a full-time position requiring 1880 hours of support per year; and work is performed at a customer location. As a Sensor Operations Process Engineer on our team, you will provide process engineering, program planning, and mission management support to customer’s SIGINT sensor operations organization. You will prepare draft Concept of Operations documents, task schedules and other program development and planning...
Peraton is hiring an Innovation Projects Lead Systems Engineer to join our Cyber Mission business unit in Jessup, MD. As a systems engineer on our team, you will support one of the largest enterprise-wide Engineering contracts within the Intelligence Community. This is a full-time position requiring 1880 hours of support per year; and work is performed at the customer site.
As an Innovation Projects Lead Systems Engineer on our team you will provide systems engineering and other technical assistance to customer’s requirements development and planning for National SIGINT systems. You will be the Senior Systems Engineer supporting a national tactical radio frequency operations related innovation lab....
Peraton is hiring anEnterprise Infrastructure Services Information Systems Security Officer (ISSO) to join our Cyber Mission business unit in Fort Meade, Maryland. As an ISSO on our team, you will support one of the largest enterprise-wide engineering contracts within the Intelligence Community. This is a full-time position requiring 1880 hours of support per year; and work is performed at our National Business Parkway office.
As an ISSO on our team you will provide support for a program, organization, system, or...
Peraton is hiring a Capabilities Development Systems Engineer to join our Cyber Mission business unit in Fort Meade, Maryland. As a Systems Engineer on our team, you will support one of the largest enterprise-wide engineering contracts within the Intelligence Community. This is a full-time position requiring 1880 hours of support per year; and work is performed at a customer location. As a Capabilities Development Systems Engineer on our team, you will provide recommendations on the use of operational platforms and strategies tailored to specific mission needs. You will develop operational concepts in support of mission and...
Peraton is hiring a SIGINT Systems Engineer to join our Cyber Mission business unit in Fort Meade, MD. As a Systems Engineer on our team, you will support one of the largest enterprise-wide engineering contracts within the Intelligence Community. This is a full-time position requiring 1880 hours of support per year; and work is performed at a customer location. As a SIGINT Systems Engineer on our team, you will provide systems engineering principles to various systems throughout the entire systems life cycle phases: concept, development, production, utilization, and support. You will interact...
Peraton is hiring an Operations Requirements Analyst to join our Cyber Mission business unit in Fort Meade, Maryland. As an Operations Requirements Analyst on our team, you will support one of the largest enterprise-wide engineering contracts within the Intelligence Community. This is a full-time position requiring 1880 hours of support per year; and work is performed at a customer location. As an Operations Requirements Analyst on our team, you will provide technical direction in national and tactical cryptologic capabilities. You will facilitate requirements gathering by coordinating technical exchange meetings (and other meetings as needed) with the Services, Combat...
Peraton is hiring an SCCM Support Systems Engineer to join our Cyber Mission business unit in Jessup, MD. As a Systems Engineer on our team, you will support one of the largest enterprise-wide engineering contracts within the Intelligence Community. This is a full-time position requiring 1880 hours of support per year; and work is performed at a customer location. As a Microsoft Systems Center Configuration Manager (SCCM) Support Systems Engineer on our team you will be client-facing and will have responsibility for performing all aspects of SCCM planning, setup, deployment and maintenance. Provide technical architecture guidance and leadership for various areas to include design and develop highly...
Peraton is hiring a PM Support Process Engineer to join our Cyber Mission business unit in Jessup, MD. As a Process Engineer on our team, you will support one of the largest enterprise-wide engineering contracts within the Intelligence Community. This is a full-time position requiring 1880 hours of support per year; and work is performed at a customer location. As a PM Support Process Engineer on our team, you will support a customer computer network operations organization by providing cross-organizational systems engineering and project management expertise to assist with the following activities:
Peraton is hiring a Reporting Authoring and Dissemination (RAD) Systems Engineer to join our Cyber Mission business unit in Ft. Meade, MD. As a Systems Engineer on our team, you will support one of the largest enterprise-wide engineering contracts within the Intelligence Community. This is a full-time position requiring 1880 hours of support per year; and work is performed at a customer location. As a RAD Systems Engineer on this team, you will support the RAD product through requirements management, thread coordination and sprint product analysis. You will also support the build and maintenance of end-to-end system integration test plans, manage Confluence and Jira artifacts, maintain...
Peraton is hiring an Infrastructure Services Systems Engineer to join our Cyber Mission business unit in Annapolis Junction, MD. As a Systems Engineer on our team, you will support one of the largest enterprise-wide engineering contracts within the Intelligence Community. This is a full-time position requiring 1880 hours of support per year; and work is performed at a customer location. As an Infrastructure Services Systems Engineer on our team, you will provide support for EIS developmental and...
Peraton is seeking a Splunk Software Engineer to join our team in Linthicum, MD. Our dynamic team delivers information security solutions that facilitate secure data flows and the detection/prevention of unauthorized behaviors, performs system security vulnerability assessments and solution development, provide enterprise-level network, server, desktop, and application security services.
As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton...
Peraton Labs is seeking a highly motivated individual to support and enhance development of classified and unclassified network research prototypes for a government research customer. Candidates will work in a dynamically changing environment and expected to be able to acquire and adapt new technologies to create state-of-the-art prototypes. We are seeking an individual with a combination of skills and flexibility to help make a difference in mission-oriented research prototypes. Not all of the skills listed below are required, but the candidate should be motivated, willing, and excited about learning and...
This position is an integral member of the Peraton Labs Network Systems and Cyber Mission Sector team supporting a customer site in College Park and Laurel, MD. Primarily location is College Park with the option for 1-2 days a week in Laurel.
Responsibilities may include:
- Implement, maintain, and enhance complex and diverse research infrastructure systems and their appropriate security posture
- Perform Linux and Microsoft Windows system administration tasks
- Windows and Linux server system administration
- Integrating GOTS/COTS/open-source solutions
- Virtualization technologies
- Networking and TCP/IP protocols
- Storage technologies
- Remote...
Peraton is seeking SkillBridge Interns to support our Information Technology Capabilities Contract (ITCC II), providing opportunities for transitioning service members officially authorized by their respective military branch to participate in the DoD SkillBridge program. Peraton offers real-world training and in-demand work experience while having the opportunity to evaluate the service member's suitability for future employment. Our SkillBridge program is designed to help service members with existing skill sets align with our organizational needs and transition smoothly into civilian careers at Peraton.
Through the Information Technology Capabilities Contract (ITCC II), we provide...
Peraton Labs is seeking an experienced Senior Research Scientist to join our team supporting fully cleared research efforts for our Maryland customer. You will work on cutting-edge research and development projects in a collaborative and innovative team environment and will be instrumental in solving the most complex challenges in a broad range of initiatives in computer network defense, secure-by-design techniques, and cyber operations and experimentation platforms. Your expertise and areas of interest may be applied on one or more programs, providing you numerous opportunities to learn and grow.
Peraton Labs is seeking a skilled and experienced Senior Research Scientist to join our team supporting fully cleared research efforts for our Maryland customer. You will work on cutting-edge research and development projects in a collaborative and innovative team environment and will be instrumental in solving the most complex challenges in a broad range of initiatives in computer network defense, secure-by-design techniques, and cyber operations and experimentation platforms. Your expertise and areas of interest may be applied on one or more programs, providing you numerous opportunities to learn and grow.
Peraton is seeking an experienced Records Management Specialist / WMS Operator to join our USCYBERCOM team located in Fort Meade, MD.
In this role you will:
- Perform a variety of analytical and administrative duties involved in the development, implementation, and administration of the Command’s records management program as well as the development of...
GEF Capability Management. Provide the following capability management functions to enable and ensure that the IT systems are controlled, balanced, and aligned to Enterprise needs:
• Provide draft Project Schedules, Implementation Plans, Information System Support Plans and Project Spend Plans for NETCOM Capability Manager approval.
• Schedule project meetings, provide project management, and support services for NETCOM while providing recommendations for classified and unclassified environments and integration services in coordination with Government personnel to support and implement Enterprise initiatives. These services include support to the following: Enterprise Fabrics, Data Center, Management Services, Network (routing, switching,...
Cyber Protection, Assessment and Authorization, and Risk Management Framework (RMF). Provides cybersecurity functional support for assessments, authorizations, and documentation Enterprise-fielded systems managed by NETCOM HQ. Efforts include using the Enterprise Mission Assurance Support Service (eMASS) to record RMF activities such as control implementation of all applicable security controls as identified via information system security categorization in accordance with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 and Committee on National Security Systems Instructions (CNSSI) 1253. The number of families and controls will vary depending on the security categorization, the application of overlays (privacy, classified,...
Cyber Protection, Assessment and Authorization, and Risk Management Framework (RMF). Provides cybersecurity functional support for assessments, authorizations, and documentation Enterprise-fielded systems managed by NETCOM HQ. Efforts include using the Enterprise Mission Assurance Support Service (eMASS) to record RMF activities such as control implementation of all applicable security controls as identified via information system security categorization in accordance with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 and Committee on National Security Systems Instructions (CNSSI) 1253. The number of families and controls will vary depending on the security categorization, the application of overlays (privacy, classified,...
The Network Management operation focuses on the operation of the IP networks that provide data transport for the DoDIN-A and local area network (LAN) internal support. The GCC controls and maintains operational responsibilities within the boundary between installation LAN and Wide Area Networks (WAN). Provides network support services to include Enterprise network operation, DNS, web filtering and proxy servers, Virtual Private Network (VPN), Installation Processing Node (IPN), Theater IP management, network management, monitoring, access control, and firewalls. All network-supported device implementation is either virtual, software defined, or physical based on system owner deployment.
• Model-Driven DevOps for Scaled Brownfield Network Automation....
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
System Management Branch. Part of DoDIN-A operations focus on multiple dispersed, independent/intra-dependent systems performing multiple functions (Operating System (OS), Hardware (HW), database, software applications, etc.) that are interoperable with other elements or systems to perform a function as part of a larger, more complex system. The GCC operates, monitors, sustains, and secures Enterprise directed systems throughout the GCC AOR and internal services.
• Sensor Operation and Management. The GCC uses network and host monitoring systems (IPS/IDS, SIEM, and other sensor systems) to monitor, detect, identify, verify, and report security events. Support the Government by installing, maintaining, deploying, managing, and hardening multiple types of...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
System Management Branch. Part of DoDIN-A operations focus on multiple dispersed, independent/intra-dependent systems performing multiple functions (Operating System (OS), Hardware (HW), database, software applications, etc.) that are interoperable with other elements or systems to perform a function as part of a larger, more complex system. The GCC operates, monitors, sustains, and secures Enterprise directed systems throughout the GCC AOR and internal services.
• Sensor Operation and Management. The GCC uses network and host monitoring systems (IPS/IDS, SIEM, and other sensor systems) to monitor, detect, identify, verify, and report security events. Support the Government by installing, maintaining, deploying, managing, and hardening multiple types of...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
System Management Branch. Part of DoDIN-A operations focus on multiple dispersed, independent/intra-dependent systems performing multiple functions (Operating System (OS), Hardware (HW), database, software applications, etc.) that are interoperable with other elements or systems to perform a function as part of a larger, more complex system. The GCC operates, monitors, sustains, and secures Enterprise directed systems throughout the GCC AOR and internal services.
• Virtualization Management / SAN / Backup. The GCC operates, maintains, secures, and monitors Virtual Infrastructure (VI) internally and within Enterprise virtual systems owner environments. The GCC uses various cloud and cloud computing services. Most virtual environments are Private Cloud...
The Network Management operation focuses on the operation of the IP networks that provide data transport for the DoDIN-A and local area network (LAN) internal support. The GCC controls and maintains operational responsibilities within the boundary between installation LAN and Wide Area Networks (WAN). Provides network support services to include Enterprise network operation, DNS, web filtering and proxy servers, Virtual Private Network (VPN), Installation Processing Node (IPN), Theater IP management, network management, monitoring, access control, and firewalls. All network-supported device implementation is either virtual, software defined, or physical based on system owner deployment.
• Enterprise Protected Domain Name Service (EP-DNS). The GCC manages...
System Management Branch. Part of DoDIN-A operations focus on multiple dispersed, independent/intra-dependent systems performing multiple functions (Operating System (OS), Hardware (HW), database, software applications, etc.) that are interoperable with other elements or systems to perform a function as part of a larger, more complex system. The GCC operates, monitors, sustains, and secures Enterprise directed systems throughout the GCC AOR and internal services.
• Directory Services. The GCC operates, maintains, secures, and troubleshoots authentication and directory services IAW system owner policies and guidance. Manage, sustain, and deploy authentication, directory, ands policy services in support of the GCC AOR, Army Unified Directory Services...
The Network Management operation focuses on the operation of the IP networks that provide data transport for the DoDIN-A and local area network (LAN) internal support. The GCC controls and maintains operational responsibilities within the boundary between installation LAN and Wide Area Networks (WAN). Provides network support services to include Enterprise network operation, DNS, web filtering and proxy servers, Virtual Private Network (VPN), Installation Processing Node (IPN), Theater IP management, network management, monitoring, access control, and firewalls. All network-supported device implementation is either virtual, software defined, or physical based on system owner deployment.
• Enterprise Protected Domain Name Service (EP-DNS). The GCC manages...
Portal Development and Maintenance. Performs the below functions in support of the Government’s SharePoint requirements.
• Design, develop, and implement, SharePoint portals supporting NETCOM-wide business processes and information sharing requirements.
• Design, develop, and implement automated workflows based on Government requirements.
• Design and develop web sites, web pages, web parts and custom list solutions based on Government requirements.
The Knowledge Management (KM) Section is responsible for enabling knowledge flow to enhance a shared understanding, learning, and decision-making across the GCC. The KM section develops, executes, and monitors the GCC KM Program. Additionally, the KM Section conducts Content and Information Management, and Records Management, through the utilization of tools such as ARIMS, SharePoint Online, Microsoft Teams, Microsoft OneDrive, and other cloud and on premises solutions, in line with Army doctrine. The KM Section consists of the KM Working Group (KMWG) with representatives from each of the GCC divisions, and is lead by the KM Officer (KMO). All GCC KM efforts are authorized, overseen, and guided by the GCC Chief Knowledge Officer (CKO), the Deputy Director.
The Network Management operation focuses on the operation of the IP networks that provide data transport for the DoDIN-A and local area network (LAN) internal support. The GCC controls and maintains operational responsibilities within the boundary between installation LAN and Wide Area Networks (WAN). Provides network support services to include Enterprise network operation, DNS, web filtering and proxy servers, Virtual Private Network (VPN), Installation Processing Node (IPN), Theater IP management, network management, monitoring, access control, and firewalls. All network-supported device implementation is either virtual, software defined, or physical based on system owner deployment.
• Network Services. The GCC defends the DoDIN-A by secure operation...
The Network Management operation focuses on the operation of the IP networks that provide data transport for the DoDIN-A and local area network (LAN) internal support. The GCC controls and maintains operational responsibilities within the boundary between installation LAN and Wide Area Networks (WAN). Provides network support services to include Enterprise network operation, DNS, web filtering and proxy servers, Virtual Private Network (VPN), Installation Processing Node (IPN), Theater IP management, network management, monitoring, access control, and firewalls. All network-supported device implementation is either virtual, software defined, or physical based on system owner deployment.
• Network Services. The GCC defends the DoDIN-A by secure operation...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
Sustainment Division Support. The Sustainment Division provides GCC mission services to improve the efficiency and effectiveness of operational support services for both the GCC and the Warfighter. The Sustainment Division provides foundational services such as continual process improvement, cost control, mission planning, and opportunities for organizational efficiencies which include development of tools, asset management (HW/SW) for LCM and property accountability and security control to protect GCC CONUS managed DODIN-A services (NIPRNet and SIPRNet).
• Cyber and Physical Security Services. Perform cybersecurity services to secure DODIN-A information systems and networks (NIPRNet, SIPRNet) as dictated by AR 25-2, AR 380-5, AR 190-13, and all other...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets...
Peraton is seeking a Contracts Administration, Advisor to join our Cyber Solutions Business Unit within the Cyber Mission Solutions (CMS) Sector. The Contracts Administrator would be responsible for:
- Manage a portfolio of contract of various contract types, complexities, and sizes monitor invoices/budgets against contracts and mitigate cost overruns
- Ensure project compliance with government contracting...